File tree Expand file tree Collapse file tree 1 file changed +1
-5
lines changed
java/ql/src/experimental/Security/CWE/CWE-470 Expand file tree Collapse file tree 1 file changed +1
-5
lines changed Original file line number Diff line number Diff line change 4
4
* package signature but only rely on package name.
5
5
* This makes it susceptible to package namespace squatting
6
6
* potentially leading to arbitrary code execution.
7
- * @kind path-problem
8
7
* @problem.severity error
9
8
* @precision high
10
9
* @id java/unsafe-reflection
59
58
where
60
59
maCreatePackageContext .getCallee ( ) .getDeclaringType ( ) .getQualifiedName ( ) = "android.content.ContextWrapper" and
61
60
maCreatePackageContext .getCallee ( ) .getName ( ) = "createPackageContext" and
62
-
63
61
not isSignaturesChecked ( maCreatePackageContext ) and
64
-
65
62
lvdePackageContext .getEnclosingStmt ( ) = maCreatePackageContext .getEnclosingStmt ( ) and
66
63
TaintTracking:: localTaint ( DataFlow:: exprNode ( lvdePackageContext .getAnAccess ( ) ) , sinkPackageContext ) and
67
-
68
64
doesPackageContextLeadToInvokeMethod ( sinkPackageContext , maInvoke )
69
65
select
70
66
lvdePackageContext ,
71
67
sinkPackageContext ,
72
68
maInvoke ,
73
- maCreatePackageContext . getArgument ( 0 )
69
+ "Potential arbitary code execution due to class loading without package signature checking."
74
70
You can’t perform that action at this time.
0 commit comments