Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Security checks based on untrusted sources can be bypassed. The untrusted object or parameter should be defensively copied before the security check is performed. The copy operation must be a deep copy; the implementation of the clone() method may produce a shallow copy, which can still be compromised. In addition, the implementation of the clone() method can be provided by the attacker. See rule OBJ06-J. Defensively copy mutable inputs and mutable internal components for more information.

...

This noncompliant code example describes a security vulnerability from the JDK Java 1.5 .0 java.io package. In this release, java.io.File was non-finalnonfinal, allowing an attacker to supply an untrusted parameter argument constructed by extending the legitimate File class. In this manner, the getPath() method can be overridden so that the security check passes the first time it is called but the value changes the second time to refer to a sensitive file such as /etc/passwd. This is a form of time-of-check-, time-of-use (TOCTOU) vulnerability.

...

This vulnerability can be mitigated by making declaring java.io.File final.

Compliant Solution (Copy)

This compliant solution ensures that the java.io.File object can be trusted despite not being final. The solution creates a new File object using the standard constructor. This ensures that any methods invoked on the File object are the standard library methods rather than overriding methods potentially that may be provided by the attacker.

...

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="12fba730cc704459-6b59706a-4946406f-b7bea69b-15336f9f96ef4254215438e5"><ac:plain-text-body><![CDATA[

[ISO/IEC TR 24772:2010

http://www.aitcnet.org/isai/]

" Authentication Logic Error [XZO] "

]]></ac:plain-text-body></ac:structured-macro>

MITRE CWE

CWE-302, ". Authentication Bypass bypass by Assumed-Immutable Data" assumed-immutable data

 

CWE-470, ". Use of Externallyexternally-Controlled Input to Select Classes or Code ('Unsafe Reflection')" controlled input to select classes or code ("unsafe reflection")

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="cc97e6d6cca327c2-3f0aa1a4-42b24988-9b4f8442-2f160f63c8c58b237abc44cd"><ac:plain-text-body><![CDATA[

[[Sterbenz 2006

AA. Bibliography#Sterbenz 06]]

]]></ac:plain-text-body></ac:structured-macro>

...