Input Validation

9th June 2021 | Cybrary Input Validation


input validation cybrary

Input Validation, also known as data validation, is the testing of any input (or data) provided by a user or application against expected criteria. Input validation prevents malicious or poorly qualified data from entering an information system. Applications should check and validate all input entered into a system to prevent attacks and mistakes. Input validation is also important when receiving data from external parties or sources. Incorrect input validation can allow injection attacks, memory leakage, and ultimately a compromised system(s). 

Input validation can use two distinct sets of criteria for validation. These criteria for comparison can be an allow list or deny list. Allow-list data validation is preferable over deny-listing data validation. Deny-listing relies on IT staff knowing all attacks that exist (what to specifically deny) and may be used against your application or system. Allow-lists rely on IT staff knowing what commands and data types are permitted or acceptable, and permitting them to pass through their systems (having systems rejecting ALL malicious data scanned by the filters). 

Setting up allow or deny lists are very important for strong defense-in-depth security in your data handling systems and applications. 

What does this mean for an SMB?

There are ‘Input Validation Attacks’ where hackers deliberately enter malicious input with the intention of confusing, crashing, or corrupting an application. The result of these actions is to cause an unplanned action, system outage, or even remote access. Malicious input can include code, scripts, and commands, which if not validated correctly can be used to exploit vulnerabilities. The most common input validation attacks include Buffer Overflow, XSS attacks, and SQL injection. The OWASP Top 10 mentions input validation as an alleviation strategy for both SQL injection and XSS but it should not be used as the primary method of preventing these attacks, though if properly implemented, it can considerably lower their impact. Having those working in application security should be well aware of these threats as well as the other 9 threats listed in the OWASP Top Ten

CyberHoot includes a training program for developers that overviews the top 10 mistakes programmers make in application development. 

In addition to having developers beef up your application security, there are actions that can be taken by all employees in your business to reduce the likelihood of falling victim to any cyber attack:

Start building your robust, defense-in-depth cybersecurity plan at CyberHoot.

To learn more about Input Validation, watch this short 2-3 minute video:

Sources: 

ScienceDirect

WhiteHatSec

Additional Reading:

JBS Ransomware Attack Shows Importance of Backups

Colonial Pipeline Attacked Via Ransomware

TX Requiring Cyber Training Following Pipeline Breach

Related Terms:

Buffer Overflow Attack

OWASP Top Ten

Cross-Site Scripting (XSS)

Find out how CyberHoot can secure your business.


Schedule a demo

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more
CyberHoot Newsletter – May 2025

CyberHoot Newsletter – May 2025

Welcome to CyberHoot's May Newsletter! This month, we're spotlighting key developments in the cyber threat...

Read more