title | layout | tags | contributors | document | order | permalink |
---|---|---|---|---|---|---|
Encode and Escape Data Checklist |
col-document |
OWASP Developer Guide |
Jon Gadsden, Andreas Happe |
OWASP Developer Guide |
6240 |
/release/design/web_app_checklist/encode_escape_data/ |
{% include breadcrumb.html %}
Encoding and escaping of output data are defensive techniques meant to stop injection attacks on a target system or application which is receiving the output data.
The target system may be another software component or it may be reflected back to the initial system, such as operating system commands, so encoding and escaping output data helps to provide defense in depth for the system as a whole.
Refer to proactive control C3: Validate all Input & Handle Exceptions and its cheatsheets for more context from the OWASP Top 10 Proactive Controls project, and use the list below as suggestions for a checklist that has been tailored for the individual project.
- Apply output encoding just before the content is passed to the target system
- Conduct all output encoding on a trusted system
- Utilize a standard, tested routine for each type of outbound encoding
- Specify character sets, such as UTF-8, for all outputs
- Apply canonicalization to convert unicode data into a standard form
- Ensure the output encoding is safe for all target systems
- In particular sanitize all output used for operating system commands
Contextual output encoding of data is based on how it will be utilized by the target. The specific methods vary depending on the way the output data is used, such as HTML entity encoding.
- Contextually encode all data returned to the client from untrusted sources
- Contextually encode all output of untrusted data to queries for SQL, XML, and LDAP
- OWASP Cheat Sheet: Injection Prevention
- OWASP Java Encoder Project
- OWASP Top 10 Proactive Controls
The OWASP Developer Guide is a community effort; if there is something that needs changing then submit an issue or edit on GitHub.