rspec/rules/S6350/java/rule.adoc
2022-02-04 16:28:24 +00:00

40 lines
880 B
Plaintext

include::../description.adoc[]
include::../ask-yourself.adoc[]
include::../recommended.adoc[]
== Sensitive Code Example
Arguments like `-delete` or `-exec` for the `find` command can alter the expected behavior and result in vulnerabilities:
----
String input = request.getParameter("input");
String cmd[] = new String[] { "/usr/bin/find", input };
Runtime.getRuntime().exec(cmd); // Sensitive
----
== Compliant Solution
Use an allow-list to restrict the arguments to trusted values:
[source,java]
----
String input = request.getParameter("input");
if (allowed.contains(input)) {
String cmd[] = new String[] { "/usr/bin/find", input };
Runtime.getRuntime().exec(cmd);
}
----
include::../see.adoc[]
ifdef::env-github,rspecator-view[]
'''
== Implementation Specification
(visible only on this page)
include::../message.adoc[]
'''
endif::env-github,rspecator-view[]