Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: REM cost reform

...

Allowing tainted inputs in privileged operations can result in privilege escalation attacks.

Rule

Severity

Likelihood

Detectable

RepairableRemediation Cost

Priority

Level

SEC01-J

High

Likely

No

NoLow

P27P9

L1L2

Automated Detection

Tools that support taint analysis enable assurance of code usage that is substantially similar to the first compliant solution. Typical taint analyses assume that one or more methods exist that can sanitize potentially tainted inputs, providing untainted outputs (or appropriate errors). The taint analysis then ensures that only untainted data is used inside the doPrivileged block. Note that the static analyses must necessarily assume that the sanitization methods are always successful, but in reality, this may not be the case.

...