You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: java/ql/src/experimental/Security/CWE/CWE-665/InsecureRmiJmxEnvironmentConfiguration.qhelp
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ In order to disallow the deserialization of arbitrary objects the passed environ
16
16
Ideally this filter only allows the deserialization to <code>java.lang.String</code>.
17
17
18
18
The filter can be configured by setting the key <code>jmx.remote.rmi.server.credentials.filter.pattern</code> (CONST variable <code>RMIConnectorServer.CREDENTIALS_FILTER_PATTERN</code>).
19
-
The filter should (ideally) blacklist all classes, and only whitelist java.lang.String for deserialization: (<code>"java.lang.String;!*"</code>).
19
+
The filter should (ideally) only allow java.lang.String and disallow all other classes for deserialization: (<code>"java.lang.String;!*"</code>).
20
20
21
21
The key-value pair can be set as following:
22
22
@@ -65,4 +65,4 @@ For this reason an initialitation with a <code>null</code> environment is also v
65
65
<li>Oracle release notes fixing the issue: <ahref="https://www.oracle.com/java/technologies/javase/8u91-relnotes.html">Rlease Notes</a>.</li>
66
66
<li>Documentation for <ahref="https://docs.oracle.com/javase/10/docs/api/javax/management/remote/rmi/RMIConnectorServer.html#CREDENTIALS_FILTER_PATTERN">CREDENTIALS_FILTER_PATTERN</a></li>
0 commit comments