...
Other ruses include custom implementation of writeObject
, writeReplace
and writeExternal
methods such that sensitive fields are not written to the serialized stream or alternatively, conducting proper validation checks while de-serializing. Yet another remediation is to define the serialPersistentFields
array field and ensuring that sensitive fields are not added to the array. Sometimes it is necessary to prevent a serializable object (whose superclass implements serializable) from getting serialized. This can be achieved by throwing a NotSerializableException
from the custom writeObject()
method.
Risk Assessment
TODOIf sensitive data can be serialized then it may be transmitted over an insecure link, or stored in an insecure medium, and thereby released inappropriately.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
FIO32-J | ?? medium ?? | likely | ?? high | P?? | L?? |
Automated Detection
...
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
References
Wiki Markup |
---|
AP
\[[JLS 05|AA. Java References#JLS 05]\] [Transient modifier| |
http://java.sun.com/docs/books/jls/ |
third_edition/html/classes. |
Java I/O, by Elliotte Rusty Harold
Java Secure Coding, http://java.sun.com/security/seccodeguide.html
html#37020]
\[[Harold 99|AA. Java References#Harold 99]\]
\[[SCG 07|AA. Java References#SCG 07]\] |