Methods can return values to communicate failure or success or to update local objects or fields. Security risks can arise when method return values are ignored or when the invoking method fails to take suitable action. Consequently, programs must not ignore method return values.
When getter methods are named after an action, a programmer could fail to realize that a return value is expected. For example, the only purpose of the ProcessBuilder.redirectErrorStream()
method is to report via return value whether the process builder successfully merged standard error and standard output. The method that actually performs redirection of the error stream is the overloaded single-argument method ProcessBuilder.redirectErrorStream(boolean)
.
Noncompliant Code Example (File Deletion)
This noncompliant code example attempts to delete a file but fails to check whether the operation has succeeded:
Code Block | ||
---|---|---|
| ||
public void deleteFile(){
| ||
Wiki Markup | ||
Methods return values to communicate failure or success and at other times, to update the caller's objects or fields. Security risks can arise if return values are simply ignored or if suitable action is not taken on their receipt. Return values may be ignored intentionally or even unintentionally. For example, when getter methods that return a value are named after an action, such as {{ProcessBuilder.redirectErrorStream()}}, a programmer may not realize that a return value is expected. Incidentally, the only purpose of the {{redirectErrorStream()}} method is to tell using a return value, whether the process builder merges standard error and standard output. The action of actually redirecting the error stream is performed by its overloaded single argument version. It is important to read the API documentation so that return values are not ignored. {mc} Another example is ignoring the return value from add() on a HashSet. If duplicate, false will be returned. {mc} h2. Noncompliant Code Example This noncompliant code example attempts to delete a file, but does not check whether the operation has succeeded. {code:bgColor=#FFcccc} File someFile = new File("someFileName.txt"); // doDo something with someFile someFile.delete(); {code} h2. |
Compliant
...
Solution
...
This
...
compliant
...
solution
...
checks
...
the Boolean value returned by the delete()
...
method
...
and handles any resulting errors:
Code Block | ||
---|---|---|
| ||
public void deleteFile(){ , if necessary, handles the error. {code:bgColor=#ccccff} File someFile = new File("someFileName.txt"); // doDo something with someFile if (!someFile.delete()) { // handleHandle thefailure factto thatdelete the file has not been deleted } {code} h2. |
Noncompliant
...
Code
...
Example (String Replacement)
This noncompliant code example ignores the return value of the String.replace()
method, failing to update the original string. The String.replace()
method cannot modify the state of the String
(because String
objects are immutable); rather, it returns a reference to a new String
object containing the modified string.
Code Block | ||
---|---|---|
| ||
public class Replace}} method does not modify the state of the {{String}} but instead, returns a reference to a new {{String}} object with the replacements in place. {code:bgColor=#FFcccc} public class Ignore { public static void main(String[] args) { String original = "insecure"; original.replace( 'i', '9' ); System.out.println(original); } } {code} h2. Compliant Solution This compliant solution correctly updates the {{original}} {{String}} object by assigning to it the return value. {code:bgColor=#ccccff} public class |
It is especially important to process the return values of immutable object methods. Although many methods of mutable objects operate by changing some internal state of the object, methods of immutable objects cannot change the object and often return a mutated new object, leaving the original object unchanged.
Compliant Solution
This compliant solution correctly updates the String
reference original
with the return value from the String.replace()
method:
Code Block | ||
---|---|---|
| ||
public class ReplaceDoNotIgnore { public static void main(String[] args) { String original = "insecure"; original = original.replace( 'i', '9' ); System.out.println(original); } } {code} Another source of security vulnerabilities caused by ignoring return values is detailed in guideline [FIO02-J. Keep track of bytes read and account for character encoding while reading data]. h2. Risk Assessment Ignoring method return values can lead to unanticipated program behavior. || Guideline || Severity || Likelihood || Remediation Cost || Priority || Level || | EXP00-J | medium | probable | medium | {color:#cc9900}{*}P8{*}{color} | {color:#cc9900}{*}L2{*}{color} | h3. Automated Detection The Coverity Prevent Version 5.0 *CHECKED_RETURN* checker can detect the instance where Value returned from a function is not checked for errors before being used. h3. Related Vulnerabilities Search for vulnerabilities resulting from the violation of this rule on the [CERT website|https://www.kb.cert.org/vulnotes/bymetric?searchview&query=FIELD+KEYWORDS+contains+EXP02-J]. h2. Other Languages This rule appears in the C Secure Coding Standard as [seccode:EXP12-C. Do not ignore values returned by functions]. This rule appears in the C+\+ Secure Coding Standard as [cplusplus:EXP12-CPP. Do not ignore values returned by functions or methods]. h2. References \[[API 2006|AA. Java References#API 06]\] method [delete()|http://java.sun.com/javase/6/docs/api/java/io/File.html#delete()] \[[API 2006|AA. Java References#API 06]\] method [replace()|http://java.sun.com/javase/6/docs/api/java/lang/String.html#replace(char,%20char)] \[[Green 2008|AA. Java References#Green 08]\] ["String.replace"|http://mindprod.com/jgloss/gotchas.html] \[[Pugh 2009|AA. Java References#Pugh 09]\] misusing putIfAbsent \[[MITRE 2009|AA. Java References#MITRE 09]\] [CWE ID 252|http://cwe.mitre.org/data/definitions/252.html] "Unchecked Return Value" ---- [!The CERT Oracle Secure Coding Standard for Java^button_arrow_left.png!|04. Expressions (EXP)] [!The CERT Oracle Secure Coding Standard for Java^button_arrow_up.png!|04. Expressions (EXP)] [!The CERT Oracle Secure Coding Standard for Java^button_arrow_right.png!|EXP01-J. Do not compare String objects using equality or relational operators] |
Risk Assessment
Ignoring method return values can lead to unexpected program behavior.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
EXP00-J | Medium | Probable | Medium | P8 | L2 |
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| JAVA.NULL.RET.UNCHECKED | Call Might Return Null (Java) | ||||||
Coverity | 7.5 | CHECKED_RETURN | Implemented | ||||||
Parasoft Jtest |
| CERT.EXP00.NASSIG CERT.EXP00.AECB | Ensure method and constructor return values are used Avoid "try", "catch" and "finally" blocks with empty bodies | ||||||
PVS-Studio |
| V6010, V6101 | |||||||
SonarQube |
| Return values from functions without side effects should not be ignored Return values should not be ignored when they contain the operation status code | |||||||
SpotBugs |
| RV_RETURN_VALUE_IGNORED | Implemented |
Related Guidelines
VOID EXP12-CPP. Do not ignore values returned by functions or methods | |
Passing Parameters and Return Values [CSJ] | |
CWE-252, Unchecked Return Value |
Bibliography
[API 2006] | |
Misusing | |
[Seacord 2015] |
...