Unsanitized user input in logger message

Description

Logging unsanitized user input can lead to log forgery or malicious content injection. This vulnerability arises when user input is directly included in log messages without proper sanitization.

Remediations

  • Do not include unsanitized user input in log messages. This can allow attackers to manipulate log files or inject harmful content.
    String username = request.getParameter("username");
    log.warn("Username is" + username); // unsafe
  • Do sanitize user input before logging it. Ensure that any data derived from user input is cleaned to prevent log injection attacks.
    String username = sanitized(request.getParameter("username"));
    log.warn("Username is" + username);

References

Associated CWE

OWASP Top 10

Configuration

To skip this rule during a scan, use the following flag

bearer scan /path/to/your-project/ --skip-rule=java_lang_log_injection

To run only this rule during a scan, use the following flag

bearer scan /path/to/your-project/ --only-rule=java_lang_log_injection