Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Hardcoding Hard coding sensitive information, such as passwords, server IP addresses, and encryption keys , can expose the information to attackers. Anyone who has access to the class files can decompile them and consequently can discover the sensitive information. Consequently, hardcoding sensitive information is forbidden.Leaking data protected by International Traffic in Arms Regulations (ITAR) or the Health Insurance Portability and Accountability Act (HIPAA) can also have legal consequences. Consequently, programs must not hard code sensitive information.

Hard coding sensitive information also increases the need to manage and accommodate changes to the code. For example, changing a hard-coded password in a deployed program may require distribution of a patch [Chess 2007 Wiki MarkupHardcoding sensitive information also increases the need to manage and accommodate changes to the code. For example, changing a hardcoded password in a fielded program may require distribution of a patch \[[Chess 2007|AA. Bibliography#Chess 07]\].

Noncompliant Code Example

This noncompliant code example uses includes a password field hard-coded server IP address in a constant String. :

Code Block
bgColor#FFcccc

class PasswordIPaddress {
  String passwordipAddress = new String("guest172.16.254.1");
  public static void main(String[] args) {
    //...
  }
}

A malicious user can use the javap -c PasswordIPaddress command to disassemble the class and discover the hardcoded passwordhard-coded server IP address. The output of the disassembler as shown below, reveals the password guest in cleartext.server IP address 172.16.254.1 in clear text:

Code Block

Compiled from "PasswordIPaddress.java"
class PasswordIPaddress extends java.lang.Object{
java.lang.String passwordipAddress;

PasswordIPaddress();
  Code:
   0:	     aload_0
   1:	invokespecial	     invokespecial     #1; //Method java/lang/Object."<init>":()V
   4:	     aload_0
   5:	new	     new   #2; //class java/lang/String
   8:	     dup
   9:	ldc	     ldc   #3; //String guest172.16.254.1
   11:	invokespecial	    invokespecial     #4; //Method java/lang/String."<init>":(Ljava/lang/String;)V
   14:	putfield	    putfield    #5; //Field passwordipAddress:Ljava/lang/String;
   17:	    return

public static void main(java.lang.String[]);
  Code:
   0:	     return

}

Compliant Solution

This compliant solution retrieves the password server IP address from an external file located in a secure directory. Exposure , as recommended by FIO00-J. Do not operate on files in shared directories. It reads the file in compliance with FIO10-J. Ensure the array is filled when using read() to fill an array. Exposure of the IP address is further limited by clearing the password storing it in a char array rather than a java.lang.String, and by clearing the server IP address from memory immediately after use.

Code Block
bgColor#ccccff

class PasswordIPaddress {
  public static void main(String[] args) throws IOException {
    char[] passwordipAddress = new char[100];	;
    int offset = 0;
    int charsRead = 0;
    BufferedReader br = null;
    try {
      br = new BufferedReader(new InputStreamReader(
             new FileInputStream("credentialsserveripaddress.txt")));
      while ((charsRead = br.read(ipAddress, offset, ipAddress.length - offset))
        // Reads the password into the char array, returns the number of bytes read != -1) {
        offset += charsRead;
    int n     if (offset >= bripAddress.read(password);  length) {
          break;
    // Decrypt password, perform operations}
    for(int i = n - 1; i >= 0; i--) {  }
      
      // Manually clear out the password immediately after use ... Work with IP address

    } finally {
      password[i] =Arrays.fill(ipAddress,  (byte) 0);	 
    }
    br.close();
    }
  }
}

To further limit the exposure time of the sensitive passwordserver IP address, replace BufferedReader with a direct native input/output (NIO) buffer, which can be cleared immediately after use.

Noncompliant Code Example (

...

Hard-Coded Database Password)

The This noncompliant code example hardcodes the user name and password fields in the SQL connection request .are hard coded in this noncompliant code example:

Code Block
bgColor#FFcccc

public final Connection getConnection() throws SQLException {
  return DriverManager.getConnection(
      "jdbc:mysql://localhost/dbName", 
      "username", "password");
}

Note that the one- and two-argument java.sql.DriverManager.getConnection() methods can also be used incorrectly. Applets that contain similar code are also unacceptable because they may be executed in untrusted environments.

Compliant Solution

This compliant solution reads the user name and password from a configuration file located in a secure directory. :

Code Block
bgColor#ccccff

public final Connection getConnection() throws SQLException {
  String username;
  String password;
  // Username and password are read at runtime from a secure config file
  return DriverManager.getConnection(
      "jdbc:mysql://localhost/dbName", username, password);
}

It is also permissible to prompt the user for the user name and password at runtime.

When possible, sensitive information such as passwords should be stored in character arrays rather than strings because the Java Virtual Machine may retain strings long after they are no longer needed. However, this example uses strings because DriverManager.getConnection() requires them.

Risk Assessment

Hardcoding Hard coding sensitive information exposes that information to attackers. The severity of this rule can vary depending on the kind of information that is disclosed. Frequently, the information disclosed is password or key information, which can lead to remote exploitation. Consequently, a high severity rating is given but may be adjusted downwards according to the nature of the sensitive data

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

MSC03-J

high

High

probable

Probable

medium

Medium

P12

L1

Automated Detection

ToolVersionCheckerDescription
CodeSonar

Include Page
CodeSonar_V
CodeSonar_V

JAVA.HARDCODED.PASSWD
JAVA.MISC.SD.EXT

Hardcoded Password (Java)
Sensitive Data Written to External Storage (Java)

Coverity7.5

HARDCODED_CREDENTIALS
CONFIG
FB.DMI_CONSTANT_DB_ PASSWORD
FB.DMI_EMPTY_DB_PASSWORD

Implemented
Fortify1.0

Password_Management
Password_Management__Hardcoded_Password

Partially implemented
Parasoft Jtest
Include Page
Parasoft_V
Parasoft_V
CERT.MSC03.HCCS
CERT.MSC03.HCCK
CERT.MSC03.AHCA
Avoid passing hardcoded usernames/passwords/URLs to database connection methods
Avoid using hard-coded cryptographic keys
Avoid hard-coding the arguments to certain methods
PMD1.0AvoidUsingHardCodedIPPartially implemented
SonarQube
Include Page
SonarQube_V
SonarQube_V
S1313
S2068
Partially implemented

Related Vulnerabilities

GERONIMO-2925, GERONIMO-1135

Other Languages

...

 describes a vulnerability in the WAS CE tool, which is based on Apache Geronimo. It uses the Advanced Encryption Standard (AES) to encrypt passwords but uses a hard-coded key that is identical for all the WAS CE server instances. Consequently, anyone who can download the software is provided with the key to every instance of the tool. This vulnerability was resolved by having each new installation of the tool generate its own unique key and use it from that time on.

Related Guidelines

...

[

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="fa31731e-8ab8-4800-9ac6-a7ab4b81b6fc"><ac:plain-text-body><![CDATA[

ISO/IEC TR 24772:2010

http://www.aitcnet.org/isai/]

"

Hard-coded Password [XYP]

" ]]></ac:plain-text-body></ac:structured-macro>

MITRE CWE

CWE

ID

-259,

"

Use of Hard-

coded

Coded Password

"  


CWE

ID

-798,

"

Use of Hard-

coded

Coded Credentials

"

Bibliography

Android Implementation Details

Hard-coded information can be easily obtained on Android by using the apktool to decompile an application or by using dex2jar to convert a dex file to a jar file.

Bibliography

[Chess 2007]

Section 11.2, "

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="cf751be3-bdff-4619-bcc8-6045bac49089"><ac:plain-text-body><![CDATA[

[[Chess 2007

AA. Bibliography#Chess 07]]

11.2

Outbound Passwords: Keep Passwords out of Source Code

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup

"

ac:schema-version="1" ac:macro-id="c08892f6-342c-4cd6-b143-566df87bfb8a"><ac:plain-text-body><![CDATA[

[

[

Fortify 2008

AA. Bibliography#Fortify 08

]

]

"Unsafe Mobile Code: Database Access"

]]></ac:plain-text-body></ac:structured-macro>

<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="73f9c36a-9659-4233-8341-bc208664be5c"><ac:plain-text-body><![CDATA

[

[[

Gong 2003

AA. Bibliography#Gong 03

]

]

Section 9.4, "Private Object State and Object Immutability

]]></ac:plain-text-body></ac:structured-macro>

"


...

Image Added Image Added Image AddedImage Removed      49. Miscellaneous (MSC)      MSC04-J. Store passwords using a hash function