...
Misuse of APIs that perform language access checks only against the immediate caller can break data encapsulation, leak sensitive information, or permit privilege escalation attacks.
Rule | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
SEC05-J | High | Probable | Yes | MediumNo | P12 | L1 |
Automated Detection
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| CodeSonar |
| JAVA.CLASS.ACCESS.BYPASS | Reflection bypasses member accessibility (Java) | ||||||
| Parasoft Jtest |
| CODSTACERT.BPSEC05.ARM | ImplementedAvoid using reflection methods | ||||||
| SonarQube |
| Changing or bypassing accessibility is security-sensitive | |||||||
| SpotBugs |
| REFL_REFLECTION_INCREASES_ACCESSIBILITY_OF_CLASS | Implemented (since 4.5.0) |
Related Guidelines
Guideline 9-10 / ACCESS-10: Be aware of standard APIs that perform Java language access checks against the immediate caller |
...