The product checks a value to ensure that it is less than or equal to a maximum, but it does not also verify that the value is greater than or equal to the minimum.
Some products use signed integers or floats even when their values are only expected to be positive or 0. An input validation check might assume that the value is positive, and only check for the maximum value. If the value is negative, but the code assumes that the value is positive, this can produce an error. The error may have security consequences if the negative value is used for memory allocation, array access, buffer access, etc. Ultimately, the error could lead to a buffer overflow or other type of memory corruption. The use of a negative number in a positive-only context could have security implications for other types of resources. For example, a shopping cart might check that the user is not requesting more than 10 items, but a request for -3 items could cause the application to calculate a negative price and credit the attacker's account.
Impact: Modify Application DataExecute Unauthorized Code or Commands
An attacker could modify the structure of the message or data being sent to the downstream component, possibly injecting commands.
Impact: DoS: Resource Consumption (Other)
in some contexts, a negative value could lead to resource consumption.
Impact: Modify MemoryRead Memory
If a negative value is used to access memory, buffers, or other indexable structures, it could access memory outside the bounds of the buffer.
Strategy: Enforcement by Conversion
Strategy: Input Validation
ccc
// check that the array index is less than the maximum*
c
cc
// check that the array index is within the correct*
cjava
// variable for bank account balance* private double accountBalance;
java
java
// other methods for accessing the BankAccount object* ...}
java
// method to withdraw amount from BankAccount* public void withdraw(double withdrawAmount) { ``` if (withdrawAmount < MAXIMUM_WITHDRAWAL_LIMIT && withdrawAmount > MINIMUM_WITHDRAWAL_LIMIT) { ...