Sensitive operations must be protected by security manager checks. Refer to guideline ENV02-J. Create a secure sandbox using a Security Manager to learn about the importance of performing security checks and limiting code to a secure sandbox.
Noncompliant Code Example
This noncompliant code example instantiates a Hashtable
and defines a removeEntry()
method to allow the removal of its entries. This method is considered sensitive, perhaps because the hash table contains sensitive information. However, the method is public and non-finalnonfinal, which leaves it susceptible exposed to malicious callers.
Code Block | ||
---|---|---|
| ||
class SensitiveHash { private Hashtable<Integer,String> ht = new Hashtable<Integer,String>(); public void removeEntry(Object key) { ht.remove(key); } } |
Compliant Solution
This compliant solution demonstrates how installs a security check can be installed to protect entries from being maliciously removed from the Hashtable
instance. A SecurityException
is thrown if the caller does not possess lacks the java.security.SecurityPermission
removeKeyPermission
.
Code Block | ||
---|---|---|
| ||
class SensitiveHash { private Hashtable<Integer,String> ht = new Hashtable<Integer,String>(); public void removeEntry(Object key) { check("removeKeyPermission"); ht.remove(key); } private void check(String directive) { SecurityManager sm = System.getSecurityManager(); if (sm != null) { sm.checkSecurityAccess(directive); } } } |
The SecurityManager.checkSecurityAccess()
method determines whether or not the action controlled by the particular permission is allowed or not.
Noncompliant Code Example (check*()
)
This noncompliant code example uses the SecurityManager.checkRead()
method to check whether the file schema.dtd
can be read from the file system. The problem with the check*()
methods is that lack support for fine-grained access control is not possible, that is, the result of the check can only be black and white. There is no way to enforce that . For example, the check*()
methods are inadequate to enforce a policy permitting read access to all files with the dtd
extension are allowed to be read whereas access to others is blocked. New code should rarely use and forbidding read access to all other files. Code that is not itself part of the JDK must not override the check*()
APIs methods because the default implementations of the Java API libraries already use them these methods to protect sensitive operations.
Code Block | ||
---|---|---|
| ||
SecurityManager sm = System.getSecurityManager(); if (sm != null) { //check Check ifwhether file canmay be read sm.checkRead("/local/schema.dtd"); } |
Compliant Solution
...
(checkPermission()
)
Java SE 1.2 added two methods—Two methods, checkPermission(Permission perm)
and checkPermission(Permission perm, Object context)
, were added to —to the SecurityManager
class in J2SE 1. 2. The motivations for this change were manifold:included
- Eliminating the need to hard code names of checks in method names.
- Encapsulating
- The
checkPermission()
methods eliminated the requirement of hardcoding names of the checks in the method name. - They used only one copy of the complicated algorithms and code for examining the Java runtime by using in a common single
checkPermission()
method. - Newer permissions for resources could be easily added by encapsulating them in a new
Permission
subclassSupporting introduction of additional permissions by subclassing thePermission
class.
The single-argument checkPermission()
method uses the context of the currently executing thread environment to perform the checks. If the context has the permissions defined in the local policy file, the check succeeds; otherwise, otherwise a SecurityException
is thrown.
This compliant solution shows the single-argument checkPermission()
method and allows that checks to see whether the files in the local
directory , with that have the dtd
extension , to can be read. DTDPermission
is a custom permission that enforces this level of access (See guideline SEC10-J. Define custom security permissions for fine grained security for details on creating custom permissions). Even if the java.io.FilePermission
is granted to the application with the action "read
", DTD
files will be are subject to additional access control.
Code Block | ||
---|---|---|
| ||
SecurityManager sm = System.getSecurityManager(); if (sm != null) { //check Check ifwhether file canmay be read DTDPermission perm = new DTDPermission("/local/", "readDTD"); sm.checkPermission(perm); } |
Compliant Solution (Multiple Threads)
Occasionally, Sometimes the security check code exists in one context (such as a worker thread) while , whereas the check has to must be conducted on a different context, such as on another thread. The two-argument checkPermission()
method is used in this case. It accepts an AccessControlContext
instance as the context
argument. The effective permissions are not computed as those of the context
argument only rather than the intersection of the permissions of the two contexts and consist of the permissions of the context
argument only.
Both the single- and double-argument checkPermission()
methods defer to the single-argument java.security.AccessController.checkPermission(Permission perm)
method. When invoked directly, this method operates only on the current execution context and, as a result, does not supersede the security manager's two-argument version.
There is also another (cleaner and preferable) way to handle the A cleaner approach to making a security check from a different context . This is accomplished by taking is to take a snapshot of the current execution context in which the check must be performed, using the java.security.AccessController.getContext()
method that returns an AccessControlContext
object. The AccessControlContext
class itself defines a checkPermission()
method that encapsulates a context instead of accepting the current executing context as a parameteran argument. This is shown belowapproach allows the check to be performed at a later time, as shown in the following example.
Code Block | ||
---|---|---|
| ||
// Take the snapshot of the required context, store in acc, and pass it to another context AccessControlContext acc = AccessController.getContext(); // Accept acc in another context and invoke checkPermission() on it acc.checkPermission(perm); |
Risk Assessment
Failing Failure to enforce security checks in code that performs sensitive operations can lead to malicious tampering of sensitive data.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|
SEC04-J |
High |
Probable |
Medium | P12 | L1 |
Automated Detection
Identifying sensitive operations requires assistance from the programmer; fully - automated identification of sensitive operations is beyond the current state of the art.
Given knowledge of which operations are sensitive, as well as which specific security checks must be enforced for those operationseach operation, an automated tool could reasonably enforce the invariant that the sensitive operations are invoked only from contexts where the required security checks have been performed.
Tool | Version | Checker | Description | |||||
---|---|---|---|---|---|---|---|---|
Parasoft Jtest |
| CERT. |
...
SEC04.SCF | Enforce 'SecurityManager' checks before setting or getting fields |
Android Implementation Details
The java.security
package exists on Android for compatibility purposes only, and it should not be used.
Bibliography
[API 2014] |
...
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this guideline on the CERT website.
Bibliography
Wiki Markup |
---|
\[[API 2006|AA. Bibliography#API 06]\] |
SEC07-J. Classes that derive from a sensitive class or implement a sensitive interface should be declared to befinal 02. Platform Security (SEC) SEC09-J. Do not base security checks on untrusted sources