Exceptions that are thrown while logging is in progress can prevent successful logging unless special care is taken. Failure to account for exceptions during the logging process can cause security vulnerabilities such as allowing an attacker to conceal critical security exceptions by preventing them from being logged. Consequently, programs must ensure that data logging continues to operate correctly even when exceptions are thrown during the logging process.
Noncompliant Code Example
This noncompliant code example writes a critical security exception to the standard error stream.
try { // ... } catch (SecurityException se) { System.err.println(e); // Recover from exception }
Writing such exceptions to the standard error stream is inadequate for logging purposes. First, the standard error stream may be exhausted, preventing recording of subsequent exceptions. Second, the trust level of the standard error stream may be insufficient for recording certain security critical exceptions or errors without leaking sensitive information. If an I/O error occurs while writing the security exception, the catch
block will throw an IOException
and the critical security exception will be lost. Finally, an attacker may disguise the exception so that it occurs with several other innocuous exceptions.
Similarly, using Console.printf()
, System.out.print*()
or e.printStackTrace()
to output a security exception also constitutes a violation of this rule.
Compliant Solution
This compliant solution uses java.util.logging.Logger
, the default logging API provided by JDK 1.4 and later. Use of other compliant logging mechanisms, such as log4j, is also permitted.
try { // ... } catch(SecurityException se) { logger.log(Level.SEVERE, se); // Recover from exception }
Typically, only one logger is required for the entire program.
Risk Assessment
Exceptions thrown during data logging can cause loss of data and can conceal security problems.
Recommendation |
Severity |
Likelihood |
Remediation Cost |
Priority |
Level |
---|---|---|---|---|---|
ERR07-J |
medium |
likely |
high |
P6 |
L2 |
Related Vulnerabilities
Bibliography
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="98a207e8-a339-43f8-96b7-82276df84ad5"><ac:plain-text-body><![CDATA[ |
[[API 2006 |
AA. Bibliography#API 06]] |
[Class Logger |
http://java.sun.com/javase/6/docs/api/java/util/logging/Logger.html] |
]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="01bb8ecb-a8f1-46d5-9b9a-5cd88d7fff79"><ac:plain-text-body><![CDATA[ |
[[JLS 2005 |
AA. Bibliography#JLS 05]] |
[Chapter 11, Exceptions |
http://java.sun.com/docs/books/jls/third_edition/html/exceptions.html] |
]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="d8e98547-8e02-4a5f-9ff5-8235d9afbca0"><ac:plain-text-body><![CDATA[ |
[[Ware 2008 |
AA. Bibliography#Ware 08]] |
|
]]></ac:plain-text-body></ac:structured-macro> |
ERR06-J. Do not allow exceptions to expose sensitive information 06. Exceptional Behavior (ERR)