DEV Community

Abhinav Singwal
Abhinav Singwal

Posted on

Finding Weak Input Validation in Address Fields

While testing a web application’s account settings feature, I came across an interesting case related to input validation.

What I Found

The application allowed users to update details such as:

  • City
  • State
  • Name
  • Phone
  • Postal Code
  • Street fields

By intercepting the request and modifying these parameters, I was able to submit arbitrary values like:

Vulnerable@123

The application accepted these values without any validation and stored them successfully. When revisiting the profile page, the same values were reflected exactly as submitted.

Why This Matters

At first glance, this might look like a low impact issue. But weak input validation can lead to:

  • Data integrity problems
  • Inconsistent behavior in downstream systems
  • Potential attack surface if combined with other vulnerabilities

For example, if such inputs are later used in templates, logs, or external integrations, they could introduce unexpected behavior or even security risks.

Technical Observation

  • No strict server side validation was enforced
  • Client side controls were easily bypassed
  • Arbitrary characters and formats were accepted
  • Data was reflected without normalization

Report Outcome

The issue was marked as:

  • Informational
  • Duplicate

Since it did not directly lead to a security impact, it was considered low priority.

Key Takeaways

  • Never rely only on client side validation
  • Always enforce strong server side validation
  • Even low severity issues are worth exploring
  • Try chaining small issues to uncover real impact

Top comments (0)