File tree Expand file tree Collapse file tree 2 files changed +2
-4
lines changed
java/ql/src/Security/CWE/CWE-094 Expand file tree Collapse file tree 2 files changed +2
-4
lines changed Original file line number Diff line number Diff line change 1
- // Bad: arbitrary code execution
1
+ // Bad: ScriptEngine allows arbitrary code injection
2
2
ScriptEngineManager scriptEngineManager = new ScriptEngineManager ();
3
3
ScriptEngine scriptEngine = scriptEngineManager .getEngineByExtension ("js" );
4
4
Object result = scriptEngine .eval (code );
Original file line number Diff line number Diff line change @@ -14,9 +14,7 @@ Use "Cloudbees Rhino Sandbox" or sandboxing with SecurityManager or use <a href=
14
14
15
15
<example >
16
16
The following code could executes random JavaScript code
17
- ScriptEngineManager scriptEngineManager = new ScriptEngineManager();
18
- ScriptEngine scriptEngine = scriptEngineManager.getEngineByExtension("js");
19
- Object result = scriptEngine.eval(code);
17
+ <sample src =" ScriptEngine.java" />
20
18
</example >
21
19
22
20
<references >
You can’t perform that action at this time.
0 commit comments