File tree Expand file tree Collapse file tree 1 file changed +1
-5
lines changed
java/ql/src/experimental/Security/CWE/CWE-470 Expand file tree Collapse file tree 1 file changed +1
-5
lines changed Original file line number Diff line number Diff line change 44 * package signature but only rely on package name.
55 * This makes it susceptible to package namespace squatting
66 * potentially leading to arbitrary code execution.
7- * @kind path-problem
87 * @problem.severity error
98 * @precision high
109 * @id java/unsafe-reflection
5958where
6059 maCreatePackageContext .getCallee ( ) .getDeclaringType ( ) .getQualifiedName ( ) = "android.content.ContextWrapper" and
6160 maCreatePackageContext .getCallee ( ) .getName ( ) = "createPackageContext" and
62-
6361 not isSignaturesChecked ( maCreatePackageContext ) and
64-
6562 lvdePackageContext .getEnclosingStmt ( ) = maCreatePackageContext .getEnclosingStmt ( ) and
6663 TaintTracking:: localTaint ( DataFlow:: exprNode ( lvdePackageContext .getAnAccess ( ) ) , sinkPackageContext ) and
67-
6864 doesPackageContextLeadToInvokeMethod ( sinkPackageContext , maInvoke )
6965select
7066 lvdePackageContext ,
7167 sinkPackageContext ,
7268 maInvoke ,
73- maCreatePackageContext . getArgument ( 0 )
69+ "Potential arbitary code execution due to class loading without package signature checking."
7470
You can’t perform that action at this time.
0 commit comments