Many classes, including {{Pattern}} and those that support {{XML}} and {{SQL}} based actions by passing {{String}} arguments to methods, allow inclusion of escape sequences in character and string literals. According to \[[JLS 05|AA. Java References#JLS 05]\] section 3.10.6 "Escape Sequences for Character and String Literals":classes allow inclusion of escape sequences in character and string literals; examples include Wiki Markup java.util.regex.Pattern
as well as classes that support XML- and SQL-based actions by passing string arguments to methods. According to the Java Language Specification (JLS), §3.10.6, "Escape Sequences for Character and String Literals" [JLS 2013],
The character and string escape sequences allow for the representation of some nongraphic characters as well as the single quote, double quote, and backslash characters in character literals (§3§3.10.4) and string literals (§3§3.10.5).
In order to correctly Correct use of escape sequences pertaining to String
literals, an understanding of in string literals requires understanding how the escape sequences are interpreted by the Java compiler as well as how they are interpreted is essential. For example, SQL
statements written in Java, sometimes require certain special escape characters or sequences (for instance, sequences containing \t
, \n
, \r
). In SQL
queries, all escape sequences by any subsequent processor, such as a SQL engine. SQL statements may require escape sequences (for example, sequences containing \t
, \n
, \r
) in certain cases, such as when storing raw text in a database. When representing SQL statements in Java string literals, each escape sequence must be preceded by an extra backslash for correct interpretation.
As yet another example, consider the Pattern
class that finds extensive use used in performing regular expression-related tasks. In Java, a given String
A string literal used for pattern matching is compiled into an instance of the Pattern
type. If When the pattern to be matched contains an undesired escape sequence such as a '\n', to avoid it being interpreted by the Java bytecode compiler as an escape sequence, the Pattern
class requires the literal to be preceded by a backslash ('
n', which now correctly denotes back references instead of a new line)a sequence of characters identical to one of the Java escape sequences—"\"
and "n"
, for example—the Java compiler treats that portion of the string as a Java escape sequence and transforms the sequence into an actual newline character. To insert the newline escape sequence, rather than a literal newline character, the programmer must precede the "\n"
sequence with an additional backslash to prevent the Java compiler from replacing it with a newline character. The string constructed from the resulting sequence,
Code Block |
---|
\\n
|
consequently contains the correct two-character sequence \n
and correctly denotes the escape sequence for newline in the pattern.
In general, for a particular escape character of the form '\X
', the equivalent Java representation is "
Code Block |
---|
...
\\X
|
Noncompliant Code Example
...
(String Literal)
This noncompliant code example defines In the following example, a method, splitWords()
, that finds matches between the String
string literal (WORDS
) and the input sequence. Since '\b' is It is expected that WORDS
would hold the escape sequence for matching a word boundary. However, the misleading notion that String
literals can be used as is, can convince the implementer that the pattern matches to word boundaries and thus splits a given string into individual words. Instead, the Java compiler treats the "\b"
literal as a Java escape sequence, and the string WORDS
silently compiles to a regular expression that checks for a single backspace character.
Code Block | ||
---|---|---|
| ||
import java.util.regex.Pattern; public class BadSplitterSplitter { private// finalInterpreted Stringas WORDS = "\b";backspace // IntendFails to split on word boundaries private final String WORDS = "\b"; public String[] splitWords(String input) { Pattern ppattern = Pattern.compile(WORDS); String[] input_array = ppattern.split(input); return input_array; } } |
Compliant Solution (String Literal)
This compliant solution shows the correctly escaped value of the String
string literal WORDS
that results in a regular expression designed to split on word boundaries.:
Code Block | ||
---|---|---|
| ||
public class Splitter {
// Interpreted as two chars, '\' and 'b'
// Correctly splits on word boundaries
private final String WORDS = "\\b";
public String[] split(String input){
Pattern pattern = Pattern.compile(WORDS);
String[] input_array = pattern.split(input);
return input_array;
}
}
|
Noncompliant Code Example (String Property)
This noncompliant code example uses the same method, splitWords()
. This time the WORDS
string is loaded from an external properties file.
Code Block |
---|
public class Splitterimport java.util.regex.Pattern; public class GoodSplitter { private final String WORDS; public Splitter() throws IOException { Properties properties = new Properties(); "\\b"; // Will allow splitting on word boundaries properties.load(new FileInputStream("splitter.properties")); WORDS = properties.getProperty("WORDS"); } public String[] split(String input){ Pattern ppattern = Pattern.compile(WORDS); String[] input_array = ppattern.split(input); return input_array; } } |
Risk Assessment
In the properties file, the WORD
property is once again incorrectly specified as \b
.
Code Block | ||
---|---|---|
| ||
WORDS=\b |
This is read by the Properties.load()
method as a single character b
, which causes the split()
method to split strings along the letter b
. Although the string is interpreted differently than if it were a string literal, as in the previous noncompliant code example, the interpretation is incorrect.
Compliant Solution (String Property)
This compliant solution shows the correctly escaped value of the WORDS
property:
Code Block | ||
---|---|---|
| ||
WORDS=\\b |
Applicability
Incorrect use of escape characters in string inputs Incorrect usage of escape characters in String
literals can result in misinterpretation and potential corruption of data.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
MSC35-J | medium | unlikely | high | P2 | L3 |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
References
Automated Detection
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
The Checker Framework |
| Tainting Checker | Trust and security errors (see Chapter 8) |
Bibliography
[API 2013] | Class Pattern, "Backslashes, Escapes, and Quoting" Package java.sql |
[JLS 2013] | §3.10.6, "Escape Sequences for Character and String Literals" |
...
\[[JLS 05|AA. Java References#JLS 05]\] 3.10.6 Escape Sequences for Character and String Literals
\[[API 06|AA. Java References#API 06]\] [Class Pattern|http://java.sun.com/javase/6/docs/api/java/util/regex/Pattern.html] "Backslashes, escapes, and quoting"
\[[API 06|AA. Java References#API 06]\] [Package java.sql|http://java.sun.com/javase/6/docs/api/java/sql/package-summary.html] Wiki Markup