Skip to content

Conversation

@pixee-standardchartered
Copy link

Remediation

This change fixes "Classes should not be loaded dynamically" (id = java:S2658) identified by Sonar.

Details

This change fixes Reflection Injection vulnerabilities by limiting what types can be loaded.

Without a protection like this, attackers can cause arbitrary classes to be loaded, methods to be executed, etc., in your application, which could lead to remote code execution, denial of service, or other unwanted behaviors.

Depending on how the reflection APIs are used and what types are available on the classpath, this vulnerability can be quite dangerous, and in fact GitHub itself had a High-severity vulnerability of this type recently .

This change can be improved further by adding more restrictions like this available in the Reflection API.

More reading

I have additional improvements ready for this repo! If you want to see them, leave the comment:

@pixeebot next

... and I will open a new PR right away!

🧚🤖 Powered by Pixeebot

Feedback | Community | Docs | Codemod ID: sonar:java/unsafe-reflection-s2658

<sonar.host.url>https://sonarcloud.io</sonar.host.url>
<sonar.organization>pixee</sonar.organization>
</properties>
<versions.java-security-toolkit>1.2.1</versions.java-security-toolkit>
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This library holds security tools for protecting Java API calls.

License: MIT ✅ | Open source ✅ | More facts

@sonarqubecloud
Copy link

Please retry analysis of this Pull-Request directly on SonarQube Cloud

@pixee-standardchartered
Copy link
Author

I'm confident in this change, but I'm not a maintainer of this project. Do you see any reason not to merge it?

If this change was not helpful, or you have suggestions for improvements, please let me know!

@pixee-standardchartered
Copy link
Author

Just a friendly ping to remind you about this change. If there are concerns about it, we'd love to hear about them!

@pixee-standardchartered
Copy link
Author

This change may not be a priority right now, so I'll close it. If there was something I could have done better, please let me know!

You can also customize me to make sure I'm working with you in the way you want.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants