
According to the Java Language Specification [[JLS 05]]:
When used as a primary expression, the keyword
this
denotes a value that is a reference to the object for which the instance method was invoked (§15.12), or to the object being constructed. The type ofthis
is the classC
within which the keywordthis
occurs. At run time, the class of the actual object referred to may be the classC
or any subclass ofC
.
The this
reference is said to have escaped when it is made available beyond its current scope. Common ways by which the this
reference can escape include:
- Returning
this
from a non-private method - Passing
this
as an argument to an alien method - Publishing
this
from the constructor of an object under construction - Publishing
this
such that pieces of code beyond its current scope can obtain its reference - Calling a non-final method from a constructor (MET04-J. Ensure that constructors do not call overridable methods)
- Overriding the finalizer of a non-final class and obtaining the
this
reference of a partially constructed instance, when the construction of the object ceases (OBJ04-J. Do not allow partially initialized objects to be accessed) - Passing internal object state to an alien method and exposing the
this
reference of internal objects
This guideline focuses on the potential consequences of this
escaping during object construction including race conditions and improper initialization. In general, it is important to detect cases where the this
reference can leak out beyond the scope of the current context. In particular, be careful when using public
variables and methods.
Noncompliant code Example (publish before initialization)
This noncompliant code example publishes the this
reference before initialization has concluded, by storing it in a public static
class field. Consequently, other threads may obtain a partially initialized Publisher
instance.
class Publisher { public static volatile Publisher pub; int num; Publisher(int number) { pub = this; // Initialization this.num = number; // ... } }
Also, if the object construction or initialization depends on a security check within the constructor, the security check will be bypassed if an untrusted caller obtains the partially initialized instance (see OBJ04-J. Do not allow partially initialized objects to be accessed for more details).
Noncompliant Code Example (nonvolatile public static
field)
This noncompliant code example publishes the this
reference in the last statement of the constructor but is still vulnerable because the field pub
is not declared volatile
and has public
accessibility.
class Publisher { public static Publisher pub; int num; Publisher(int number) { // Initialization this.num = number; // ... pub = this; } }
Compliant Solution
This compliant solution declares the pub
field as volatile
and reduces the accessibility of the static
class field to package-private so that untrusted callers beyond the current package cannot obtain the this
instance. More importantly, the constructor publishes the this
reference after initialization has concluded.
class Publisher { static volatile Publisher pub; Publisher(int number) { // Initialization this.num = number; // ... pub = this; } }
If the pub
field is not declared as volatile
initialization statements may be reordered. The Java compiler does not allow declaring the static
pub
field as final
in this case.
Noncompliant Code Example (constructor)
This noncompliant code example defines the ExceptionReporter
interface that is implemented by the class ExceptionReporters
. This class is useful for reporting exceptions after filtering out any sensitive information (EXC01-J. Use a class dedicated to reporting exceptions). The ExceptionReporters
constructor, incorrectly publishes the this
reference before construction of the object has concluded. This occurs in the last statement in the constructor (er.setExceptionReporter(this)
) which sets the exception reporter. Because it is the last statement of the constructor, this may be misconstrued as benign.
// Interface ExceptionReporter public interface ExceptionReporter { public void setExceptionReporter(ExceptionReporter er); public void report(Throwable exception); } // Class ExceptionReporters public class ExceptionReporters implements ExceptionReporter { public ExceptionReporters(ExceptionReporter er) { // Carry out initialization // Incorrectly publishes the "this" reference er.setExceptionReporter(this); } public void report(Throwable exception) { /* default implementation */ } public final void setExceptionReporter(ExceptionReporter er) { // Sets the reporter } } // Class MyExceptionReporter derives from ExceptionReporters public class MyExceptionReporter extends ExceptionReporters { private final Logger logger; public MyExceptionReporter(ExceptionReporter er) { super(er); // Calls superclass's constructor logger = Logger.getLogger("com.organization.Log"); } public void report(Throwable t) { logger.log(Level.FINEST,"Loggable exception occurred",t); } }
The class MyExceptionReporter
subclasses ExceptionReporters
with the intent of adding a logging mechanism that logs critical messages before an exception is reported. Its constructor invokes the superclass's constructor (a mandatory first step) which publishes the exception reporter before the initialization of the subclass has concluded, setting the exception handler. Note that the subclass initialization consists of obtaining an instance of the default logger.
If any exception occurs before the call to Logger.getLogger()
in the subclass, it is not logged. Instead, a NullPointerException
is generated which may be consumed by the reporting mechanism.
This erroneous behavior results from the race condition between an oncoming exception and the initialization of the subclass. If the exception comes too soon, it finds the subclass in a compromised state. This behavior is even more counter intuitive because logger
is declared final
and is not expected to contain an unintialized value.
Compliant Solution
This compliant solution declares the setReporter()
method in class MyExceptionReporter
. It explicitly calls the superclass's setExceptionReporter()
method, publishing a reference to its own Class
object. It is not permissible to publish the reference in the constructor for MyExceptionReporter
for reasons noted earlier in the noncompliant code example.
public class MyExceptionReporter extends ExceptionReporters { // ... public void setReporter(ExceptionReporter er) { super.setExceptionReporter(this); } }
Noncompliant Code Example (inner class)
It is possible for the this
reference to implicitly get leaked outside the scope [[Goetz 02]]. Consider inner classes that maintain a copy of the this
reference of the outer object. In this noncompliant code example, the constructor for class BadExceptionReporter
uses an anonymous inner class to publish a filter()
method. The problem occurs because the this
reference of the outer class is published by the inner class so that other threads can see it. If the class is subclassed, the issue described in the first noncompliant code example resurfaces.
public class BadExceptionReporter implements ExceptionReporter { public BadExceptionReporter(ExceptionReporter er) { er.setExceptionReporter(new ExceptionReporters(er) { public void report(Throwable t) { filter(t); } }); } public void filter(Throwable t) { // Filters sensitive exceptions } public void report(Throwable exception) { // Default implementation } public void setExceptionReporter(ExceptionReporter er) { // Sets the reporter } }
Compliant Solution
A private
constructor alongside a public
factory method can be used to safely publish the filter()
method from within the constructor [[Goetz 06]].
public class GoodExceptionReporter implements ExceptionReporter { private final ExceptionReporters er; private GoodExceptionReporter(ExceptionReporter excr) { er = new ExceptionReporters(excr) { public void report(Throwable t) { filter(t); } }; } public static GoodExceptionReporter newInstance(ExceptionReporter excr) { GoodExceptionReporter ger = new GoodExceptionReporter(excr); excr.setExceptionReporter(ger.er); return ger; } public void filter(Throwable t) { } public void report(Throwable exception) { } public void setExceptionReporter(ExceptionReporter er) { } }
Noncompliant Code Example (thread)
This noncompliant code example starts a thread from within the constructor. This allows the new thread to access the this
reference of the current object [[Goetz 02], [Goetz 06]].
public someConstructor() { thread = new MyThread(this); thread.start(); }
Compliant Solution
In this compliant solution, even though the thread is created in the constructor, it is not started until its start()
method is called from method startThread()
[[Goetz 02], [Goetz 06]].
public someConstructor() { thread = new MyThread(this); } public void startThread() { thread.start(); }
Risk Assessment
Allowing the this
reference to escape may result in improper initialization and runtime exceptions.
Rule |
Severity |
Likelihood |
Remediation Cost |
Priority |
Level |
---|---|---|---|---|---|
CON14-J |
medium |
probable |
high |
P4 |
L3 |
Automated Detection
TODO
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
References
[[JLS 05]] Keyword "this"
[[Goetz 02]]
[[Goetz 06]] 3.2. Publication and Escape
VOID CON14-J. Ensure atomicity of 64-bit operations 11. Concurrency (CON) 11. Concurrency (CON)