File tree Expand file tree Collapse file tree 2 files changed +2
-4
lines changed
java/ql/src/Security/CWE/CWE-094 Expand file tree Collapse file tree 2 files changed +2
-4
lines changed Original file line number Diff line number Diff line change 1- // Bad: arbitrary code execution
1+ // Bad: ScriptEngine allows arbitrary code injection
22ScriptEngineManager scriptEngineManager = new ScriptEngineManager ();
33ScriptEngine scriptEngine = scriptEngineManager .getEngineByExtension ("js" );
44Object result = scriptEngine .eval (code );
Original file line number Diff line number Diff line change @@ -14,9 +14,7 @@ Use "Cloudbees Rhino Sandbox" or sandboxing with SecurityManager or use <a href=
1414
1515<example >
1616The following code could executes random JavaScript code
17- ScriptEngineManager scriptEngineManager = new ScriptEngineManager();
18- ScriptEngine scriptEngine = scriptEngineManager.getEngineByExtension("js");
19- Object result = scriptEngine.eval(code);
17+ <sample src =" ScriptEngine.java" />
2018</example >
2119
2220<references >
You can’t perform that action at this time.
0 commit comments