the_Grinch wrote: » Could do some form of virus scanning upon uploading of the file. Also, probably a number of tools that could validate the header of the file to confirm that it is truly a csv/xls. I'd make sure you have a policy preventing the execution of macros as well.
Mike7 wrote: » Is the website for file upload only? No download? Then make sure the upload files are not directly accessible after download via URL such as /upload/a.csv. Especially if the files contains customer information. File type extension validation is required, i.e. only allow XLS and CSV with validation done on web server side. You do not want someone to upload a .aspx or .php file and use it to execute code on your web server. Are you processing the file contents after upload? Do you need to keep the files after processing it? Please files in a folder where dynamic code execution is not allowed. I am not so concerned about EXE virus as someone needs to login to the web server to execute it. You can implement antivirus scanning, but most of them are kinda slow to scan as they need to load virus signatures into memory before scanning. If the dev team use ClamAV, they can load ClamAV daemon and call clamdscan instead of clamscan. You can also engage a pen tester to test the web app for vulnerabilities.
Mike7 wrote: » AFAIK, web application scanners (at least the free ones) do not test file upload functionality.