Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Related Guidelines

SCG 2009

Guideline 6-2 Safely invoke java.security.AccessController.doPrivileged

MITRE CWE

CWE ID 266, "Incorrect Privilege Assignment"

 

CWE ID 272, "Least Privilege Violation"

 

CWE ID 732, "Incorrect Permission Assignment for Critical Resource"

SCG 2009

Guideline 6-2 Safely invoke java.security.AccessController.doPrivileged

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="6a21ce4b559246bd-da9be4af-43a842e3-ba3c9c51-24d6a40308b3e6110776f898"><ac:plain-text-body><![CDATA[

[[API 2006

AA. Bibliography#API 06]]

[method doPrivileged()

http://java.sun.com/javase/6/docs/api/java/security/AccessController.html#doPrivileged(java.security.PrivilegedAction)]

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="5980ab4d507cd7d4-b8090b61-4e6f4f02-9758a4e8-65c6c347341c997e604b3077"><ac:plain-text-body><![CDATA[

[[Gong 2003

AA. Bibliography#Gong 03]]

Sections 6.4, "AccessController"

]]></ac:plain-text-body></ac:structured-macro>

 

9.5 "Privileged Code"

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="280b53a66bd5f745-5168b2b6-445d4999-8308bb88-c39f01600bbc415f049c2349"><ac:plain-text-body><![CDATA[

[[Jovanovic 2006

AA. Bibliography#Jovanovic 06]]

"Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities"

]]></ac:plain-text-body></ac:structured-macro>

...