Untrusted code can misuse APIs provided by trusted code by overriding to override methods such as Object.equals()
, Object.hashCode()
, and Thread.run()
. These methods are primarily targeted valuable targets because they are most often commonly used behind the scenes and may interact with components in a way that is not easily discernible.
By providing overridden implementations, an attacker can use untrusted code may be able to glean sensitive information, cause run arbitrary code to run and expose denial of service vulnerabilities, or launch a denial of service attack.
See MET52-J. Do not use the clone() method to copy untrusted method parameters for more specific details regarding overriding the Object.clone()
method.
Noncompliant Code Example (hashCode
)
This noncompliant code example shows a LicenseManager
class that maintains a licenseMap
. The map stores a LicenseType
and license value pair.
...
The constructor for LicenseManager
initializes licenseMap
with a demo license key which is meant to be kept that must remain secret. The license key is hardcoded hard-coded for illustrative purposes and ; it should ideally be read from an external configuration file that stores its an encrypted version of the key. The LicenseType
class provides overridden implementations of equals()
and hashCode()
methods.
This setup can expose the demo license key if implementation is vulnerable to an attacker who extends the LicenseType
class as follows and overrides the equals()
and hashCode()
methods.:
Code Block |
---|
public class CraftedLicenseType extends LicenseType { private static int guessedHashCode = 0; @Override public int hashCode() { // Returns a new hashCode to test every time get() is called guessedHashCode++; return guessedHashCode; } @Override public boolean equals(Object arg) { // Always returns true return true; } } |
The following is the malicious client program is shown below.:
Code Block |
---|
public class DemoClient { public static void main(String[] args) { LicenseManager licenseManager = new LicenseManager(); for (int i = 0; i <= Integer.MAX_VALUE; i++) { Object guessed = licenseManager .getLicenseKey(new CraftedLicenseType()); if (guessed != null) { System.out.println(guessed); // prints ABC-DEF-PQR-XYZ System.out.println(guessed); } } } } |
The client program runs through the sequence of all possible hash codes using CraftedLicenseType
until it successfully matches the hash code of the demo license key object stored in the LicenseManager
class. Consequently, within a few minutes the attacker is able to find can discover the sensitive data present within the licenseMap
. That is made possible by facilitating in only a few minutes. The attack operates by discovering at least one hash collision with respect to the key of the map.
Compliant Solution (IdentityHashMap
)
This compliant solution uses an IdentityHashMap
instead of rather than a HashMap
to store the license information.:
Code Block | ||
---|---|---|
| ||
public class LicenseManager { Map<LicenseType, String> licenseMap = new IdentityHashMap<LicenseType, String>(); // ... } |
According to the Java API class IdentityHashMap
documentation [API 2006],
This class implements the
Map
interface with a hash table, using reference-equality in place of object-equality when comparing keys (and values). In other words, in anIdentityHashMap
, two keysk1
andk2
are considered equal if and only if(k1==k2)
. (In normalMap
implementations (likeHashMap
) two keysk1
andk2
are considered equal if and only if(k1==null ? k2==null : k1.equals(k2))
.)
Consequently, the overridden methods cannot expose internal class details. The client program can continue to add license keys and can even retrieve the added key-value pairs, as demonstrated by the following client code.
Code Block |
---|
public class DemoClient { public static void main(String[] args) { LicenseManager licenseManager = new LicenseManager(); LicenseType type = new LicenseType(); type.setType("custom-license-key"); licenseManager.setLicenseKey(type, "CUS-TOM-LIC-KEY"); Object licenseKeyValue = licenseManager.getLicenseKey(type); System.out.println(licenseKeyValue); // printsPrints CUS-TOM-LIC-KEY System.out.println(licenseKeyValue); } } |
Compliant Solution (final
...
Class)
This compliant solution declares the LicenseType
class final so that its methods cannot be overridden.:
Code Block | ||
---|---|---|
| ||
final class LicenseType { // ... } |
Noncompliant Code Example
...
This noncompliant code example consists of a Widget
class and a LayoutManager
class containing a set of widgets.:
Code Block | ||
---|---|---|
| ||
public class Widget { private int noOfComponents; public Widget(int noOfComponents) { this.noOfComponents = noOfComponents; } public int getNoOfComponents() { return noOfComponents; } public final void setNoOfComponents(int noOfComponents) { this.noOfComponents = noOfComponents; } public boolean equals(Object o) { if (o == null || !(o instanceof Widget)) { return false; } Widget widget = (Widget) o; return this.noOfComponents == widget.getNoOfComponents(); } @Override public int hashCode() { int res = 31; res = res * 17 + noOfComponents; return res; } } public class LayoutManager { private Set<Widget> layouts = new HashSet<Widget>(); public void addWidget(Widget widget) { if (!layouts.contains(widget)) { layouts.add(widget); } } public int getLayoutSize() { return layouts.size(); } } |
An attacker can extend the Widget
class as a Navigator
widget and override the equalsthe hashCode()
method.:
Code Block |
---|
public class Navigator extends Widget { public Navigator(int noOfComponents) { super(noOfComponents); } @Override public int hashCode() { int res = 31; res = res * 17; return res; } } |
Client The client code follows.:
Code Block |
---|
Widget nav = new Navigator(1); Widget widget = new Widget(1); LayoutManager manager = new LayoutManager(); manager.addWidget(nav); manager.addWidget(widget); System.out.println(manager.getLayoutSize()); // printsPrints 2 |
The set layouts
is expected to contain just one item because the number of components for both the navigator and widget being added is 1. However, the getLayoutSize()
method returns 2.
The reason for this discrepancy is that the hashCode()
method of Widget
is used only once when the widget is added to the set. When the navigator is added, the hashCode()
method provided by the Navigator
class is used. Consequently, the set contains two different object instances.
Compliant Solution (final
...
Class)
This compliant solution declares the Widget
class final so that its methods cannot be overridden.:
Code Block | ||
---|---|---|
| ||
public final class Widget { // ... } |
Noncompliant Code Example (run()
)
In this noncompliant code example, class Worker
starts a thread in and its subclass SubWorker
each contain a startThread()
method and so does its subclass SubWorker
.intended to start a thread:
Code Block | ||
---|---|---|
| ||
public class Worker implements Runnable { Worker() { } public void startThread(String name) { new Thread(this, name).start(); } @Override public void run() { System.out.println("Parent"); } } public class SubWorker extends Worker { @Override public void startThread(String name) { super.startThread(name); new Thread(this, name).start(); } @Override public void run() { System.out.println("Child"); } } |
Client If a client runs the following code:
Code Block |
---|
Worker w = new SubWorker(); w.startThread("thread"); |
The programmer expects the client may expect Parent
and Child
to be printed, however. However, Child
is printed twice . This is because the overridden method run()
is invoked both the times when that a new thread is started.
Compliant Solution
Modify This compliant solution modifies the SubWorker
class and remove removes the call to super.startThread()
. :
Code Block | ||
---|---|---|
| ||
public class SubWorker extends Worker { @Override public void startThread(String name) { new Thread(this, name).start(); } // ... } |
Modify the client The client code is also modified to start the parent and child threads separately. This program produces the expected output:
Code Block |
---|
Worker w1 = new Worker(); w1.startThread("parent-thread"); Worker w2 = new SubWorker(); w2.startThread("child-thread"); |
Related Guidelines
...
Bibliography
[API 20112013] | Class IdentityHashMap | ||
[Hawtin 2006] | [drlvm][kernel_classes] ThreadLocal vulnerability | Need to add | http://markmail.org/message/4scermxmn5oqhyii |
...