Skip to content

Commit f28e994

Browse files
timolesMarcono1234
andauthored
Update java/ql/src/experimental/Security/CWE/CWE-665/InsecureRmiJmxEnvironmentConfiguration.qhelp
More descriptive (and PC) description. Co-authored-by: Marcono1234 <[email protected]>
1 parent c22eeac commit f28e994

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

java/ql/src/experimental/Security/CWE/CWE-665/InsecureRmiJmxEnvironmentConfiguration.qhelp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ In order to disallow the deserialization of arbitrary objects the passed environ
1616
Ideally this filter only allows the deserialization to <code>java.lang.String</code>.
1717

1818
The filter can be configured by setting the key <code>jmx.remote.rmi.server.credentials.filter.pattern</code> (CONST variable <code>RMIConnectorServer.CREDENTIALS_FILTER_PATTERN</code>).
19-
The filter should (ideally) blacklist all classes, and only whitelist java.lang.String for deserialization: (<code> "java.lang.String;!*"</code>).
19+
The filter should (ideally) only allow java.lang.String and disallow all other classes for deserialization: (<code>"java.lang.String;!*"</code>).
2020

2121
The key-value pair can be set as following:
2222

@@ -65,4 +65,4 @@ For this reason an initialitation with a <code>null</code> environment is also v
6565
<li>Oracle release notes fixing the issue: <a href="https://www.oracle.com/java/technologies/javase/8u91-relnotes.html">Rlease Notes</a>.</li>
6666
<li>Documentation for <a href="https://docs.oracle.com/javase/10/docs/api/javax/management/remote/rmi/RMIConnectorServer.html#CREDENTIALS_FILTER_PATTERN">CREDENTIALS_FILTER_PATTERN</a></li>
6767
</references>
68-
</qhelp>
68+
</qhelp>

0 commit comments

Comments
 (0)