-
Story
-
Resolution: Unresolved
-
Undefined
-
None
-
None
-
None
-
False
-
-
False
-
-
Story (Required)
Prevent SSTI using the following techniques:
- Use a safe Template engine that only allows white-list functions and are syntax safe.
- Use the validation functions of the Template engine if it provides them.
- Sandbox your Template engine inside a locked down container so that arbitrary code executes inside the container.
- Create a safe environment by hardening the kernel and using read-only file systems.
- Perform server-side input validation and sanitization.
Background (Required)
Refer to the Epic description.
Out of scope
Any previous counter measures.
Approach (Required)
- Discuss this issue in the bug triage or cabal.
Dependencies
NA
Acceptance Criteria (Mandatory)
- Bring this issue to the bug triage call and take a decision on the counter measure.
- If further discussion is needed, bring this issue to the cabal.
INVEST Checklist
Dependencies identified
Blockers noted and expected delivery timelines set
Design is implementable
Acceptance criteria agreed upon
Story estimated
Legend
Unknown
Verified
Unsatisfied
Done Checklist
- Code is completed, reviewed, documented and checked in
- Unit and integration test automation have been delivered and running cleanly in continuous integration/staging/canary environment
- Continuous Delivery pipeline(s) is able to proceed with new code included
- Customer facing documentation, API docs etc. are produced/updated, reviewed and published
- Acceptance criteria are met
- clones
-
GITOPS-3675 T1365: Mitigate Server Side Request Forgery
-
- New
-
- is cloned by
-
GITOPS-3677 T257: Secure cross origin resource sharing (CORS)
-
- New
-