...
This guideline falls under EX0 of guideline FIO11-J. Do not attempt to read raw binary data as character data. Also, see the related guideline FIO02-J. Keep track of bytes read and account for character encoding while reading data for more information.
Noncompliant Code Example
This noncompliant code example reads a byte array and converts it into a String
using the platform's default character encoding. When the default encoding differs from the encoding that was used to produce the byte array, the resulting String
is likely to be incorrect. Undefined behavior can occur when some of the input lacks a valid character representation in the default encoding.
Code Block | ||
---|---|---|
| ||
try { FileInputStream fis = new FileInputStream("SomeFile"); DataInputStream dis = new DataInputStream(fis); byte[] data = new byte[1024]; dis.readFully(data); String result = new String(data); } catch (IOException x) { // handle error } |
Compliant Solution
This compliant solution explicitly specifies the intended character encoding by passing it as the second argument to the String
constructor (e.g. the string encoding
in this example).
Code Block | ||
---|---|---|
| ||
try { FileInputStream fis = new FileInputStream("SomeFile"); DataInputStream dis = new DataInputStream(fis); byte[] data = new byte[1024]; dis.readFully(data); String encoding = "SomeEncoding"; // for example, "UTF-16LE" String result = new String(data, encoding); } catch (IOException x) { // handle error } |
Exceptions
IDS17-EX0: An explicit character encoding may be omitted on the receiving side when the data was produced by a Java application that uses the same platform and default character encoding.
Risk Assessment
Failure to specify the character encoding while performing file or network IO can corrupt the data.
Guideline | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
IDS17-J | low | unlikely | medium | P2 | L3 |
Automated Detection
Sound automated detection of this vulnerability is not feasible.
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this guideline on the CERT website.
Bibliography
Wiki Markup |
---|
\[[Encodings 2006|AA. Bibliography#Encodings 06]\] |
...