...
Failure to verify a digital signature, whether manually or programmatically, can result in the execution of malicious code.
Rule | Severity | Likelihood |
|---|
Detectable | Repairable | Priority | Level |
|---|---|---|---|
SEC06-J | High | Probable | No |
No |
P6 |
L2 |
Automated Detection
Automated detection is not feasible in the fully general case. However, an approach similar to Design Fragments [Fairbanks 2007] could assist both programmers and static analysis tools.
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| CodeSonar |
| JAVA.IO.INJ.ANDROID.MESSAGE | Android Message Injection (Java) |
Related Guidelines
| ISO/IEC TR 24772:2010 | Improperly Verified Signature [XZR] |
CWE-300, Channel Accessible by Non-endpoint (aka "Man-in-the-Middle") |
Bibliography
[API 2014] |
[Bea 2008] |
JAR Signing | |
Chapter 24, "The | |
Section 12.8.3, " | |
Signature Validation | |
The | |
| [Muchow 2001] |
Chapter 12, "Digital Signatures, Signed Classes" |
...
...