...
This noncompliant code example shows a getDate()
accessor method that returns the sole instance of the private Date
object.:
Code Block | ||
---|---|---|
| ||
class MutableClass {
private Date d;
public MutableClass() {
d = new Date();
}
public Date getDate() {
return d;
}
}
|
...
This compliant solution returns a clone of the Date
object from the getDate()
accessor method. While Although Date
can be extended by an attacker, this approach is safe because the Date
object returned by getDate()
is controlled by MutableClass
and is known to be a nonmalicious subclass.
Code Block | ||
---|---|---|
| ||
public Date getDate() {
return (Date)d.clone();
}
|
Note that defensive copies performed during execution of a constructor must avoid use of the clone()
method when the class could be subclassed by untrusted code. This restriction prevents execution of a maliciously crafted overriding of the clone()
method . For more details, (see rule OBJ07-J. Sensitive classes must not let themselves be copied for more details).
Classes that have public setter methods, that is, methods whose purpose is to change class fields, must follow the related advice found in rule OBJ06-J. Defensively copy mutable inputs and mutable internal components. Note that setter methods can (and usually should) perform input validation and sanitization before setting internal fields.
...
In this noncompliant code example, the getDate()
accessor method returns an array of Date
objects. The method fails to make a defensive copy of the array before returning it. Because the array contains references to Date
objects that are mutable, a shallow copy of the array is insufficient because an attacker can modify the Date
objects in the array.
Code Block | ||
---|---|---|
| ||
class MutableClass { private Date[] date; public MutableClass() { date = new Date[20]; for (int i = 0; i < date.length; i++) { date[i] = new Date(); } } public Date[] getDate() { return date; // orOr return date.clone() } } |
Compliant Solution (Deep Copy)
This compliant solution creates a deep copy of the date
array and returns the copy, thereby protecting both the date
array and the individual Date
objects.:
Code Block | ||
---|---|---|
| ||
class MutableClass {
private Date[] date;
public MutableClass() {
date = new Date[20];
for(int i = 0; i < date.length; i++) {
date[i] = new Date();
}
}
public Date[] getDate() {
Date[] dates = new Date[date.length];
for (int i = 0; i < date.length; i++) {
dates[i] = (Date) date[i].clone();
}
return dates;
}
}
|
...
In this noncompliant code example, class ReturnRef
contains a private Hashtable
instance field. The hash table stores immutable but sensitive data (for example, social security numbers [SSNs]). The getValues()
method gives the caller access to the hash table by returning a reference to it. An untrusted caller can use this method to gain access to the hash table; as a result, hash table entries can be maliciously added, removed, or replaced. Furthermore, multiple threads can perform these modifications, providing ample opportunities for race conditions.
Code Block | ||
---|---|---|
| ||
class ReturnRef { // Internal state, may contain sensitive data private Hashtable<Integer,String> ht = new Hashtable<Integer,String>(); private ReturnRef() { ht.put(1, "123-45-6666"); } public Hashtable<Integer,String> getValues(){ return ht; } public static void main(String[] args) { ReturnRef rr = new ReturnRef(); Hashtable<Integer, String> ht1 = rr.getValues(); // Prints sensitive data 123-45-6666 ht1.remove(1); // Untrusted caller can remove entries Hashtable<Integer, String> ht2 = rr.getValues(); // Now prints null,; original entry is removed } } |
...
This compliant solution creates and returns a shallow copy of the hash table containing immutable SSNs. Consequently, the original hash table remains private, and any attempts to modify it are ineffective.
Code Block | ||
---|---|---|
| ||
class ReturnRef { // ... private Hashtable<Integer,String> getValues(){ return (Hashtable<Integer, String>) ht.clone(); // shallowShallow copy } public static void main(String[] args) { ReturnRef rr = new ReturnRef(); // Prints non-sensitivenonsensitive data Hashtable<Integer,String> ht1 = rr.getValues(); // Untrusted caller can only modify copy ht1.remove(1); // Prints non-sensitivenonsensitive data Hashtable<Integer,String> ht2 = rr.getValues(); } } |
When a hash table contains references to mutable data such as Date
objects, each of those objects must also be copied by using a copy constructor or method . For further details, (refer to rules OBJ06-J. Defensively copy mutable inputs and mutable internal components and OBJ04-J. Provide mutable classes with copy functionality to safely allow passing instances to untrusted code for further details).
Note that making deep copies of the keys of a hash table is unncessaryunnecessary; shallow copying of the references suffices because a hash table's contract dictates that its keys must produce consistent results to the equals()
and hashCode()
methods. Mutable objects whose equals()
or hashCode()
method results may be modified are not suitable keys.
...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
OBJ05-J | high High | probable Probable | medium Medium | P12 | L1 |
Automated Detection
Sound automated detection is infeasible; heuristic checks could be useful.
...
Pugh [Pugh 2009] cites a vulnerability discovered by the Findbugs static analysis tool in the early betas of JDK 1.7 where in which the sun.security.x509.InvalidityDateExtension
class returned a Date
instance through a public
accessor without creating defensive copies.
...
CWE-375. , Returning a mutable object to an untrusted caller |
...
[API 2006] | |
Item 39. Make defensive copies when needed , "Make Defensive Copies When Needed" | |
Section 3.2, "Publication and Escape: Allowing Internal Mutable State to Escape" | |
Section 9.4, "Private Object State and Object Immutability" | |
|
...