The files manipulated by the system and the users must have a defined maximum file size (5MB recommended).
When a system allows users to upload or attach files for storage, the maximum file size limit must be defined for these files, in order to avoid issues involving the availability of the service and to reduce the chance of an attacker uploading a file containing malicious software.
This requirement is verified in following services
- CWE™-409. Improper handling of highly compressed data (data amplification)
- CWE™-770. Allocation of resources without limits or throttling
- SANS 25-23. Uncontrolled Resource Consumption
- CMMC-CA_L2-3_12_2. Plan of action
- HITRUST CSF-09_j. Controls against malicious code
- ISSAF-K_9_1. Network security - Storage Area Network SAN (practices for the data-at-rest)
- CWE TOP 25-434. Unrestricted upload of file with dangerous type
- OWASP ASVS-12_1_1. File upload
- OWASP ASVS-12_1_3. File upload
- OWASP ASVS-11_1_4. Business logic security
- OWASP ASVS-12_1_2. File upload
- CWE TOP 25-400. Uncontrolled Resource Consumption
- CASA-11_1_4. Business Logic Security
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.