Hello,
I've followed the example found here: https://demos.telerik.com/aspnet-core/grid/remote-data-binding to create a grid that is bound to remote data. Everything works great. However, my IT security team has run the Rapid7 Appspider security scan on my web application and all that comes up is "vulnerabilities" related to the scanner sending bogus values for the filter, sort, and group parameters to the Grid controller. Here's an example:
Attack type: Buffer Overflow string of 100 characters
Basically it's sending a string of 100+ characters as a value to the "filter" parameter.
https://mysite.com/Grid/Orders_Read?filter=100characterlongstring
In other cases, it's sending potential harmful strings such as ./*][ and %s%f%d%x. The Grid seems to handle it by returning an error, but they may force me to handle/validate these parameters. The problem is I don't see where/how I can do that? Can you please shine some light on how I can prevent these "vulnerabilities"?
Thanks