Returning references to internal mutable members of a class can seriously compromise the security of an application because of the resulting sub par encapsulation properties and susceptibility to corruption of the class data's state. A caller can modify the private
data if instead of defensive copies of mutable class members, direct references to them are returned.
Returning references that refer to private
data to untrusted code can be more pernicious than returning the references to trusted code. If a class provides copy functionality that trusted code can use to pass defensive copies of the instance to untrusted code (OBJ10-J. Provide mutable classes with copy functionality to allow passing instances to untrusted code safely), the implementing class may violate this guideline. However, the burden is now transferred to the trusted code as it is expected to reliably call the clone()
method use the copy functionality before operating on the instance or passing it to untrusted code.
Note that the performance costs of violating this guideline (or calling using copy functionality such as clone()
) might be significantly more than using an accessor method that returns a copy of a single mutable member. This is because a well designed clone()
copy method returns a copy of the complete object, including all mutable components) as opposed to that of a single member, which makes it relatively slower.
Wiki Markup |
---|
Pugh \[[Pugh 09|AA. Java References#Pugh 09]\] cites a vulnerability discovered by the Findbugs static analysis tool in the early betas of jdk 1.7. The class {{sun.security.x509.InvalidityDateExtension}} returned a {{Date}} instance through a {{public}} accessor, without creating defensive copies. |
Noncompliant Code Example (mutable member containing immutable objects)
This noncompliant code example defines a class that contains a private
Hashtable
instance field. Here, the The hash table itself is designed to hold stores immutable data of sensitive nature (SSN numbers). A getter method getValues()
gives the caller access to the hash table by returning a reference to it. When invoked by untrusted code, entries may be maliciously added, removed or replaced.
Code Block | ||
---|---|---|
| ||
class ReturnRef {
// Internal state, may contain sensitive data
private Hashtable<Integer,String> ht = new Hashtable<Integer,String>();
private ReturnRef() {
ht.put(1, "123-45-6666");
}
public Hashtable<Integer,String> getValues(){
return ht;
}
public static void main(String[] args) {
ReturnRef rr = new ReturnRef();
Hashtable<Integer, String> ht1 = rr.getValues(); // Prints sensitive data 123-45-6666
ht1.remove(1); // Untrusted caller can remove entries
Hashtable<Integer, String> ht2 = rr.getValues(); // Now prints null, original entry is removed
}
}
|
Compliant Solution (shallow copying)
Do not provide a getter method like getValues()
that exposes private
internal mutable object state without defensively copying the state. This applies largely to members containing mutable as well as immutable datastate, however, if the internal state is of sensitive nature even immutable data may not be returned to maintain the encapsulation property (the latter condition is not mandatory for compliance). Deep copies of mutable data are required to be returned whereas it suffices to return shallow copies of mutable fields containing immutable data.
This compliant solution creates and returns a shallow copy of the hash table containing immutable SSN numbers. As a result, any attempts to modify the original hash table are ineffective.
Code Block | ||
---|---|---|
| ||
class ReturnRef { private Hashtable<Integer,String> getValues(){ return (Hashtable<Integer, String>)ht.clone(); // shallow copy } public static void main(String[] args) { ReturnRef rr = new ReturnRef(); Hashtable<Integer,String> ht1 = rr.getValues(); // prints non sensitive data ht1.remove(1); // untrusted caller can remove entries only from the copy Hashtable<Integer,String> ht2 = rr.getValues(); // prints non sensitive data } |
If the hash table contained references to mutable data such as a series of Date
objects, every one of those objects must be copied by using a copy constructor or method. For further details, refer to FIO00-J. Defensively copy mutable inputs and mutable internal components and OBJ10-J. Provide mutable classes with copy functionality to allow passing instances to untrusted code safely. Note that the keys of a hash table need not be deep copied; shallow copying of the references suffices because a hash table's contract dictates that it cannot hold duplicate keys.
Noncompliant Code Example (mutable member)
This noncompliant code example shows a getDate()
accessor method that returns the sole instance of the private Date
object. An untrusted caller will be able to manipulate this instance as it exposes internal mutable components beyond the trust boundaries of the class.
Code Block | ||
---|---|---|
| ||
class MutableClass { private Date d; public MutableClass() { d = new Date(); } protected Date getDate() { return d; } } |
An untrusted caller will be able to manipulate this instance as it exposes internal mutable components beyond the trust boundaries of the class.
Compliant Solution (shallow copying using clone()
for final classes)
Do not carry out defensive copying using the clone()
method in constructors, when the (non-system) class can be subclassed by untrusted code. This will limit the malicious code from returning a crafted object when the object's clone()
method is invoked.
...
If the class has a public
setter method , this guideline still appliesit must follow related advice as given in FIO00-J. Defensively copy mutable inputs and mutable internal components. Note that a setter method may perform input validation and sanitization before setting the internal fields. On the other hand, returning references to internal objects may not require the caller to incorporate none any of these defensive measures.
...
EX2: If the performance of the clone()
copy method is within reasonable bounds and the class clearly documents its use, this guideline may be violated. (OBJ10-J. Provide mutable classes with copy functionality to allow passing instances to untrusted code safely)
...
Returning references to internal object state (mutable or immutable) can render an application susceptible to information leaks and corrupt the object's corruption of its objects' state and violate any class invariants. Control flow may also be affected in some cases.
...