We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 7cf2e9e commit 735ab28Copy full SHA for 735ab28
java/ql/src/experimental/Security/CWE/CWE-470/UnsafeReflection.qhelp
@@ -3,9 +3,10 @@
3
4
<overview>
5
<p>
6
-Dynamically loaded classes could contain malicious code executed by a static class initializer.
7
-I.E. you wouldn't even have to instantiate or explicitly invoke methods on such classes to be
8
-vulnerable to an attack.
+Allowing users to freely select a class to load can result in invocation of unexpected dangerous code.
+Dynamically loaded classes could contain dangerous code executed by a constructor or
+static class initializer, which means a vulnerability can rairse even without invoking methods
9
+on such classes to be vulnerable to an attack.
10
</p>
11
</overview>
12
0 commit comments