Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

When defensive copying is necessary, make the defensive copies before parameter validation, and validate the copies rather than the original parameters. See rule SER07-J. Make defensive copies of private mutable components during deserialization for additional information.

Noncompliant Code Example

In this noncompliant code example, setState() and useState() fail to validate their parameters. A malicious caller could pass an invalid state to the library, consequently corrupting it and exposing a vulnerability.

...

Such vulnerabilities are particularly severe when the internal state references sensitive or system-critical data.

Compliant Solution

This compliant solution validates the method parameters and also verifies the internal state before use. This promotes consistency in program execution and reduces the potential for vulnerabilities.

Code Block
bgColor#ccccff
private Object myState = null;

// Sets some internal state in the library
void setfile(Object state) {
  if (state == null) {
    // Handle null state
  }

  // Defensive copy here when state is mutable

  if (isInvalidState(state)) {
    // Handle invalid state
  }
  myState = state;
}

// Performs some action using the state passed earlier
void useState() {
  if (myState == null) {
    // Handle no state (e.g. null) condition
  }
  // ...
}

Exceptions

MET01-EX0: Parameter validation inside a method may be omitted when the stated contract of a method requires that the caller must validate arguments passed to the method. In this case, the validation must be performed by the caller for all invocations of the method.

...

MET01-EX2: Complete validation of all parameters of all methods may introduce added cost and complexity that exceeds its value for all but the most critical code. See, for example, NUM00-J. Detect or prevent integer overflow exception NUM00-EX2. In such cases, consider parameter validation at API boundaries, especially those that may involve interaction with untrusted code.

Risk Assessment

Failure to validate method parameters can result in inconsistent computations, runtime exceptions, and control flow vulnerabilities.

Recommendation

Severity

Likelihood

Remediation Cost

Priority

Level

MET01-J

high

likely

high

P9

L2

Related Vulnerabilities

Search for vulnerabilities resulting from the violation of this rule on the CERT website.

Bibliography

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="f1fd0fca9070deb6-d8e44bad-4a9e416a-9cd79c42-8b026b3c42c99290e3b700cf"><ac:plain-text-body><![CDATA[

[[Bloch 2008

AA. Bibliography#Bloch 08]]

Item 38: Check parameters for validity

]]></ac:plain-text-body></ac:structured-macro>

...