Skip to content

Commit 2059235

Browse files
committed
Updated text in LoadClassNoSignatureCheck.qhelp
1 parent fd66f47 commit 2059235

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

java/ql/src/experimental/Security/CWE/CWE-470/LoadClassNoSignatureCheck.qhelp

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,10 @@
33

44
<overview>
55
<p>
6-
If a vulnerable app obtains the ClassLoader of any app based solely on the package name without checking the package signature
7-
allow attacker to create application with the targeted package name for "package namespace squatting".
8-
If the victim install such malicious app in the same device as the vulnerable app, the vulnerable app would load
6+
If a vulnerable loads classes or code of any app based solely on the package name of the app without
7+
first checking the package signature of the app, this could malicious app with the same package name
8+
to be loaded through "package namespace squatting".
9+
If the victim user install such malicious app in the same device as the vulnerable app, the vulnerable app would load
910
classes or code from the malicious app, potentially leading to arbitrary code execution.
1011
</p>
1112
</overview>

0 commit comments

Comments
 (0)