Skip to content

Commit

Permalink
move 5.1.5 (leftovers) to 50.8, #2487
Browse files Browse the repository at this point in the history
  • Loading branch information
Elar Lang authored and elarlang committed Feb 6, 2025
1 parent aa21b09 commit 4442f69
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 1 deletion.
2 changes: 1 addition & 1 deletion 5.0/en/0x13-V5-Validation-Sanitization-Encoding.md
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ Input validation provides valuable hygiene for the application in making sure th
| **5.1.2** | [MOVED TO 10.4.4] | | |
| **5.1.3** | [MOVED TO 11.3.1] | | |
| **5.1.4** | [SPLIT TO 11.3.2, 11.3.3] | | |
| **5.1.5** | [MODIFIED, SPLIT TO 50.8.1] Verify that the application will only automatically redirect the user to a different URL directly from an application URL where the destination appears on an allowlist. | 1 | 601 |
| **5.1.5** | [SPLIT TO 50.8.1, 50.8.5] | | |

## V5.2 Sanitization and Sandboxing

Expand Down
1 change: 1 addition & 0 deletions 5.0/en/0x50-V50-Web-Frontend-Security.md
Original file line number Diff line number Diff line change
Expand Up @@ -100,6 +100,7 @@ it may need other separate section for "end-user protection via UI"
| **50.8.2** | [MODIFIED, MOVED FROM 1.14.6] Verify that the application only uses client-side technologies which are still supported and considered secure. Examples of technologies which do not meet this requirement include NSAPI plugins, Flash, Shockwave, ActiveX, Silverlight, NACL, or client-side Java applets. | 2 | 477 |
| **50.8.3** | [ADDED] Verify that the application behaves as documented (such as warning the user or blocking access) if the browser used to access the application does not support the expected security features. | 3 | |
| **50.8.4** | [ADDED] Verify that the application's top-level domain (e.g., site.tld) is added to the public HSTS preload list so that the use of TLS for the application is built directly into the main browsers, rather than relying only on the relevant HTTP response header field. | 3 | |
| **50.8.5** | [ADDED, SPLIT FROM 5.1.5] Verify that the application will only automatically redirect the user to a different URL directly from an application URL where the destination appears on an allowlist. | 1 | 601 |

## References

Expand Down

0 comments on commit 4442f69

Please sign in to comment.