...
This noncompliant example grants AllPermission
to the klib
library.
Code Block | ||
---|---|---|
| ||
// Grant the klib library AllPermission
grant codebase "file:${klib.home}/j2se/home/klib.jar" {
permission java.security.AllPermission;
};
|
...
This compliant solution shows a policy file that can be used to enforce fine-grained permissions.
Code Block | ||
---|---|---|
| ||
grant codeBase
"file:${klib.home}/j2se/home/klib.jar", signedBy "Admin" {
permission java.io.FilePermission "/tmp/*", "read";
permission java.io.SocketPermission "*", "connect";
};
|
To check whether the caller has the requisite permissions, standard Java APIs use code such as the following:
Code Block | ||
---|---|---|
| ||
// Security manager check
FilePermission perm =
new java.io.FilePermission("/tmp/JavaFile", "read");
AccessController.checkPermission(perm);
// ...
|
...
This noncompliant code example shows an overridden getPermissions()
method, defined in a custom class loader. It grants java.lang.ReflectPermission
with target suppressAccessChecks
to any class that it loads.
Code Block | ||
---|---|---|
| ||
protected PermissionCollection getPermissions(CodeSource cs) {
PermissionCollection pc = super.getPermissions(cs);
pc.add(new ReflectPermission("suppressAccessChecks")); // permission to create a class loader
// other permissions
return pc;
}
|
...
This compliant solution does not grant java.lang.ReflectPermission
with target suppressAccessChecks
to any class that it loads.
Code Block | ||
---|---|---|
| ||
protected PermissionCollection getPermissions(CodeSource cs) {
PermissionCollection pc = super.getPermissions(cs);
// other permissions
return pc;
}
|
...
ENV03-EX0: It may be necessary to grant AllPermission
to trusted library code so that callbacks work as expected. For example, it is common practice, and acceptable, to grant AllPermission
to the optional Java packages (extension libraries):
Code Block | ||
---|---|---|
| ||
// Standard extensions extend the core platform and are granted all permissions by default
grant codeBase "file:${{java.ext.dirs}}/*" {
permission java.security.AllPermission;
};
|
...
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
ENV03-J | high | likely | low | P27 | L1 |
Automated Detection
Static detection of potential uses of dangerous permissions is a trivial search. Automated determination of the correctness of such uses is not feasible.
...
Android Implementation Details
The java.security
package exists on Android for compatibility purposes only and it should not be used. Android uses another permission mechanism for security purposes.
Bibliography
[API 2006] | |
| |
Section 2.5, Reflection | |
Section | |
Security Architecture, Section |