It is difficult to control how data members declared public
or protected
are accessed. Attackers can manipulate such members in unexpected ways. As a result data members must be declared private
. Use wrapper accessor methods to expose class members that are to be accessed outside of the package in which their class is declared. Using wrapper methods enables appropriate monitoring and control of the modification of data members (for example, by defensive copying, validating input, and logging). The wrapper methods can preserve class invariants.
Noncompliant Code Example (Public Primitive Field)
In this noncompliant code example, the data member total
keeps track of the total number of elements as they are added and removed from a container using the methods add()
and remove()
, respectively.
public class Widget { public int total; // Number of elements void add() { if (total < Integer.MAX_VALUE) { total++; // ... } else { throw new ArithmeticException("Overflow"); } } void remove() { if (total > 0) { total--; // ... } else { throw new ArithmeticException("Overflow"); } } }
As a public
data member, total
can be altered by external code independently of the add()
and remove()
methods. It is bad practice to expose fields from a public
class [[Bloch 2008]].
Compliant Solution (Private
)
This compliant solution declares total
as private
and provides a public
accessor so that the required member can be accessed beyond the current package. The add()
and remove()
methods modify its value without violating any class invariants.
Note that care must be taken when providing references to private mutable objects from acessor methods; see rule OBJ05-J. Defensively copy private mutable class members before returning their references for details.
public class Widget { private int total; // Declared private public int getTotal () { return total; } // definitions for add() and remove() remain the same }
It is good practice to use methods such as add()
, remove()
, and getTotal()
to manipulate the private internal state. These methods can perform additional functions, such as input validation and security manager checks, prior to manipulating the state.
Noncompliant Code Example (Public Mutable Field)
This noncompliant code example shows a static
mutable hash map with public
accessibility.
public static final HashMap<Integer, String> hm = new HashMap<Integer, String>();
Compliant Solution (Provide Wrappers and Reduce Accessibility of Mutable Members)
Mutable data members that are static
must be declared private
.
private static final HashMap<Integer, String> hm = new HashMap<Integer, String>(); public static String getElement(int key) { return hm.get(key); }
Depending on the required functionality, wrapper methods may retrieve either a reference to the HashMap
, a copy of the HashMap
, or a value contained by the HashMap
. This compliant solution adds a wrapper method to return the value of an element given its index in the HashMap
.
Exceptions
OBJ01-EX0: According to Sun's Code Conventions document [[Conventions 2009]]:
One example of appropriate
public
instance variables is the case where the class is essentially a data structure, with no behavior. In other words, if you would have used astruct
instead of a class (if Java supportedstruct
), then it's appropriate to make the class's instance variablespublic
.
OBJ01-EX1: "If a class is package-private or is a private
nested class, there is nothing inherently wrong with exposing its data fields – assuming they do an adequate job of describing the abstraction provided by the class. This approach generates less visual clutter than the accessor-method approach, both in the class definition and in the client code that uses it" [[Bloch 2008]]. This exception applies to both mutable and immutable fields.
OBJ01-EX2: Static final fields that contain mathematical constants may be declared public.
Risk Assessment
Failing to declare data members private
can break encapsulation.
Rule |
Severity |
Likelihood |
Remediation Cost |
Priority |
Level |
---|---|---|---|---|---|
OBJ01-J |
medium |
likely |
medium |
P12 |
L1 |
Automated Detection
Detection of public and protected data members is trivial; heuristic detection of the presence or absence of getter and setter wrapper methods is straightforward. However, simply reporting all detected cases without suppressing those cases covered by the exceptions to this rule would produce excessive false positives. Sound detection and application of the exceptions to this rule is infeasible; however, heuristic techniques may be useful.
Related Guidelines
CWE-766. Critical variable declared public |
|
Secure Coding Guidelines for the Java Programming Language, Version 3.0 |
Guideline 3-2. Define wrapper methods around modifiable internal state |
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="578bb2e9-5b66-415b-a2e0-e5e7d0390896"><ac:plain-text-body><![CDATA[ |
[[Bloch 2008 |
AA. Bibliography#Bloch 08]] |
Item 13. Minimize the accessibility of classes and members; Item 14. In public classes, use accessor methods, not public fields |
]]></ac:plain-text-body></ac:structured-macro> |
|
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="fb003bbf-9618-46df-a74b-8d153a06fe9f"><ac:plain-text-body><![CDATA[ |
[[JLS 2005 |
AA. Bibliography#JLS 05]] |
[§6.6, Access Control |
http://java.sun.com/docs/books/jls/third_edition/html/names.html#6.6] |
]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="7836d3c2-d00a-4a92-a2ce-93135e1c29eb"><ac:plain-text-body><![CDATA[ |
[[Long 2005 |
AA. Bibliography#Long 05]] |
§2.2, Public Fields |
]]></ac:plain-text-body></ac:structured-macro> |
OBJ00-J. Limit extensibility of classes and methods with invariants to trusted subclasses only 04. Object Orientation (OBJ)