...
By providing overridden implementations, an attacker can use untrusted code to glean sensitive information, run arbitrary code, or launch a denial of service attack.
See 10 MET52-J. Do not use the clone() method to copy untrusted method parameters for more specific details regarding overriding the Object.clone()
method.
Noncompliant Code Example (hashCode
)
This noncompliant code example shows a LicenseManager
class that maintains a licenseMap
. The map stores a LicenseType
and license value pair.
...
The client program runs through the sequence of all possible hash codes using CraftedLicenseType
until it successfully matches the hash code of the demo license key object stored in the LicenseManager
class. Consequently, the attacker can discover the sensitive data present within the licenseMap
in only a few minutes. The attack operates by discovering at least one hash collision with respect to the key of the map.
Compliant Solution (IdentityHashMap
)
This compliant solution uses an IdentityHashMap
rather than a HashMap
to store the license information:
...
According to the Java API class IdentityHashMap
documentation [API 2006],
This class implements the
Map
interface with a hash table, using reference-equality in place of object-equality when comparing keys (and values). In other words, in anIdentityHashMap
, two keysk1
andk2
are considered equal if and only if(k1==k2)
. (In normalMap
implementations (likeHashMap
) two keysk1
andk2
are considered equal if and only if(k1==null ? k2==null : k1.equals(k2))
.)
...
Code Block |
---|
public class DemoClient { public static void main(String[] args) { LicenseManager licenseManager = new LicenseManager(); LicenseType type = new LicenseType(); type.setType("custom-license-key"); licenseManager.setLicenseKey(type, "CUS-TOM-LIC-KEY"); Object licenseKeyValue = licenseManager.getLicenseKey(type); // Prints CUS-TOM-LIC-KEY System.out.println(licenseKeyValue); } } |
Compliant Solution (final
Class)
This compliant solution declares the LicenseType
class final so that its methods cannot be overridden:
Code Block | ||
---|---|---|
| ||
final class LicenseType { // ... } |
Noncompliant Code Example
This noncompliant code example consists of a Widget
class and a LayoutManager
class containing a set of widgets:
...
The reason for this discrepancy is that the hashCode()
method of Widget
is used only once when the widget is added to the set. When the navigator is added, the hashCode()
method provided by the Navigator
class is used. Consequently, the set contains two different object instances.
Compliant Solution (final
Class)
This compliant solution declares the Widget
class final so that its methods cannot be overridden:
Code Block | ||
---|---|---|
| ||
public final class Widget { // ... } |
Noncompliant Code Example (run()
)
In this noncompliant code example, class Worker
and its subclass SubWorker
each contain a startThread()
method intended to start a thread:
...
the client may expect Parent
and Child
to be printed. However, Child
is printed twice because the overridden method run()
is invoked both times that a new thread is started.
Compliant Solution
This compliant solution modifies the SubWorker
class and removes the call to super.startThread()
:
...
Code Block |
---|
Worker w1 = new Worker(); w1.startThread("parent-thread"); Worker w2 = new SubWorker(); w2.startThread("child-thread"); |
Bibliography
[API 2013] | Class IdentityHashMap |
[Hawtin 2006] | [drlvm][kernel_classes] ThreadLocal vulnerability |
...