1

SDEV 460 – Homework 4

Input Validation and Business Logic Security Controls

Overview:

This homework will demonstrate your knowledge of testing security controls aligned with Input

validation and business logic. You will also use the recommended OWASP testing guide reporting format

to report your test findings.

Assignment: Total 100 points

Using the readings from weeks 7 and 8 as a baseline provide the following test and analysis descriptions

or discussion:

1. Testing for Reflected Cross site scripting (OTG-INPVAL-001)

 The OWASP site list multiple approaches and examples for blackbox testing reflected XSS

vulnerabilities. In your own words, describe Reflected Cross Site scripting. Then, List and

describe 4 different examples that could be used for testing. Be sure to conduct additional

research for each example to provide your own unique test example. This most likely means you

will need to conduct some research on Javascript to make sure your syntax is correct.

2. Testing for Stored Cross site scripting (OTG-INPVAL-002)

 The OWASP site list multiple approaches and examples for blackbox testing Stored XSS

vulnerabilities. In your own words, describe Stored Cross Site scripting. Then, List and describe 2

different examples that could be used for testing. Be sure to conduct additional research for

each example to provide your own unique test example. This most likely means you will need to

conduct some research on Javascript to make sure your syntax is correct.

3. Testing for SQL Injection (OTG-INPVAL-005)

 SQL Injection remains a problem in applications yet could easily fixed. The following SQL

statement is in an HTML form as code with the $ variables directly input from the user.

SELECT * FROM Students WHERE EMPLID=’$EMPLID’ AND EMAIL=’$email’

Would a form or application that includes this code be susceptible to SQL Injection? Why?

What specific tests would you perform to determine if the applications was vulnerable?

How would you fix this problem? Be specific be providing the exact code in a Language of your choice.

(e.g. Java, PHP, Python …)

4. Test business logic data validation (OTG-BUSLOGIC-001)

 While reviewing some Java code, an analysis provided the following code snippets that contain

logic errors. For each example, describe the issue and provide code that would fix the logical

error:

a.

2

int x; x = x + 1; System.out.println(“X = ” + x);

b.

for (i=1; i<=5; i++) ; { System.out.println(“Number is ” + i); }

c.

if ( z > d) ; { System.out.println(“Z is bigger”); }

d.

String m1=”one”;

String m2=”two”;

if(m1 == m2) {

System.out.println(“M1 is equal to M2”);

}

e. The formula for the area of a trapezoid is:

A = (b1+b2)/2 * h

The following Java code is the implementation. Fix the logical error

double area;

double base1 = 2.3;

double base2 = 4.8;

double height = 12.5;

area = base1 + base2/2.0 * height;

Demonstrate your fixed code work as anticipated with a couple different test

cases.

5. Test integrity checks (OTG-BUSLOGIC-003)

 Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-003. In

your own words describe and provide 2 unique examples of integrity checks. For your

examples, provide specific testing methods for each case.

6. Test defenses against Circumvention of Work Flows (OTG-BUSLOGIC-006)

3

 Conduct some additional research on Business Logic errors related to OTG-BUSLOGIC-006. In

your own words describe and provide 2 unique examples of circumvention of work flow. For

your examples, provide specific testing methods for each case.

You should document the results for the tests and your comments, and recommendations for improved

security for each security control tested in a word or PDF document. Discuss any issues found and

possible mitigations.

Deliverables:

You should submit your document by the due date. Your document should be well-organized, include all

references used and contain minimal spelling and grammar errors.

Grading Rubric:

Attribute Meets

Reflected Cross site scripting

10 points Describes Reflected Cross Site scripting. Then, Lists and describes 4 different examples that could be used for testing. Conducts additional research for each example to provide your own unique test example.

Stored Cross site scripting

10 points Describes Stored Cross Site scripting. Then, Lists and describes 2 different examples that could be used for testing. Conducts additional research for each example to provide your own unique test example.

SQL Injection 25 points Answers: would a form or application that includes this code be susceptible to SQL Injection? Why? Answers: What specific tests would you perform to determine if the applications was vulnerable? Answers: How would you fix this problem? Provides the exact code in a Language of your choice.

Business logic data validation

15 points For each example, describes the issue and provides code that would fix the logical error.

Integrity checks 10 points Conducts research on Business Logic errors related to OTG-BUSLOGIC-003. In your own words describes and provides 2 unique examples of integrity checks. Provides specific testing methods for each case.

Defenses against workflow intervention

10 points Conducts research on Business Logic errors related to OTG-BUSLOGIC-006. In your own words describes and provides 2 unique examples of circumvention of work flow. Provides specific testing methods for each case.

Documentation and Submission

20 points Your document should be well-organized, include all references used and contain minimal spelling and grammar errors.

Published by
Dissertations
View all posts