Skip to content

Commit 735ab28

Browse files
haby0smowton
andcommitted
Update java/ql/src/experimental/Security/CWE/CWE-470/UnsafeReflection.qhelp
Co-authored-by: Chris Smowton <[email protected]>
1 parent 7cf2e9e commit 735ab28

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

java/ql/src/experimental/Security/CWE/CWE-470/UnsafeReflection.qhelp

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,10 @@
33

44
<overview>
55
<p>
6-
Dynamically loaded classes could contain malicious code executed by a static class initializer.
7-
I.E. you wouldn't even have to instantiate or explicitly invoke methods on such classes to be
8-
vulnerable to an attack.
6+
Allowing users to freely select a class to load can result in invocation of unexpected dangerous code.
7+
Dynamically loaded classes could contain dangerous code executed by a constructor or
8+
static class initializer, which means a vulnerability can rairse even without invoking methods
9+
on such classes to be vulnerable to an attack.
910
</p>
1011
</overview>
1112

0 commit comments

Comments
 (0)