07.11.2014 Views

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

Enterprise Library Test Guide - Willy .Net

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

140<br />

<strong>Enterprise</strong> <strong>Library</strong> <strong>Test</strong> <strong>Guide</strong><br />

Table 24 lists the DREAD rating for threat 9.<br />

Table 24: Threat 9 DREAD Rating<br />

D R E A D Total Rating<br />

3 3 2 3 3 14 High<br />

Table 25 lists details about threat 10.<br />

Table 25: Logging Application Block Threat 10<br />

Threat 10<br />

Name<br />

Entry points<br />

Threat<br />

description<br />

Countermeasures<br />

STRIDE<br />

classification<br />

Risk<br />

Mitigation<br />

Investigative<br />

notes<br />

Input validation is not performed<br />

The Logging Application Block does not perform input validation.<br />

Public classes and static methods<br />

The Logger class exposes the static Write method. This method accepts a<br />

log message as a parameter. However, it does not perform input validation<br />

on the message to check for NULL values. An invalid input can cause the<br />

application block to throw an unhandled exception to the application.<br />

The application block must perform input validation. For details, see the<br />

investigative notes for threat 9.<br />

Information Disclosure<br />

High<br />

No<br />

See threat 9.<br />

Table 26 lists the DREAD rating for threat 10.<br />

Table 26: Threat 10 DREAD Rating<br />

D R E A D Total Rating<br />

3 3 2 3 3 14 High<br />

Table 27 lists details about threat 11.<br />

Table 27: Logging Application Block Threat 11<br />

Threat 11<br />

Name<br />

Entry points<br />

Threat description<br />

Countermeasures<br />

Altering the log file’s directory path in the configuration file<br />

Flat file path canonical input validation<br />

Configuration files, custom configuration stores<br />

The Logging Application Block allows you to log messages to a flat file.<br />

The location of this file is included in the configuration file or custom configuration<br />

source. An attacker can change the file’s directory path to point<br />

away from the flat file and to a system file. The attacker can then send<br />

harmful log messages to that system file.<br />

The application block should only log messages to a file in the current<br />

directory. All log files should have a .txt file name extension.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!