Questions tagged [java]

Security aspects specific to the Java programming language, libraries, and virtual machine.

716 questions
23
votes
3 answers

Is Java secure for the desktop?

The Java plugin for web browsers is known to have many security issues, at least in the past. Google Chrome is not even supporting it any more, describing it as decrepit technology, and Firefox having a little warning message near it. But is the…
Dan
  • 323
  • 2
  • 7
11
votes
4 answers

Is Java relevant to Information Security?

I'm currently studying Computer Science, where we're teached Java programming. I want to get into the IT-security field, but it seems to me that Ruby and Python are more relevant for that, so I have a hard time motivating myself to learn Java. But…
user37534
  • 113
  • 1
  • 4
7
votes
4 answers

How to use Java method override to attack?

I have seen various resources that warn the potential harm of method override in Java (see reference…
drdot
  • 619
  • 2
  • 7
  • 13
7
votes
3 answers

How to resolve Path Manipulation error given by fortify?

I need to read the properties file kept in user home folder. PropertyFile=System.getProperty("user.home")+System.getProperty("file.separator")+"sample.properties"; Fortify is giving path manipulation error in this line. How to resolve this issue?
Nagendra
  • 81
  • 1
  • 2
  • 5
6
votes
2 answers

Are there any real life cases, where using final keyword in Java increases system security?

I've came across that question on StackOverflow: https://stackoverflow.com/questions/18755713/how-does-final-play-a-role-in-security The claim is made, that according to Wikipedia: A final class cannot be subclassed. This is done for reasons of …
user9850
6
votes
2 answers

JAVA (Web Application) Public Data Assigned to Private Array-Typed Field

Referring to this CWE-496, it mentions that because of the application assigning public data to a private array it is equivalent to giving public access to the array. This is not clear to me because usually before you can use the object, we must…
overshadow
  • 361
  • 3
  • 5
  • 18
5
votes
3 answers

Java vulnerability: What about OpenJDK + IcedTea?

These days there is a lot of recommendations about disabling java-plugin due to a serious vulnerability. I know this topic has already been covered on this site here and here. In the reports about the vulnerability I have read so far, they refer…
jap1968
  • 213
  • 2
  • 7
3
votes
2 answers

Secure way to store application settings

What is a proper or, if possible to tell, the best way to store configuration in matters of security? So far I can tell that a database with very restricted access is a good way, but please let's exclude the database for the moment. I'm talking…
user2504380
  • 159
  • 3
3
votes
3 answers

Java 7u11 - Safer to switch to 6?

Java update 7u11 has made some news lately for a couple reasons. Firstly, it was an out-of-band patch to resolve vulnerabilities being exploited in the wild. Then it came back up because it is now being found that the patch is incomplete. News…
Iszi
  • 27,127
  • 18
  • 101
  • 163
3
votes
2 answers

Is it safe to handle trusted data in an insecure way?

I recently found out that in java it can be very dangerous to deserialize data. See https://github.com/frohoff/ysoserial In my application I'm saving the current configuration using serialization and deserialization. I did a test and modified the…
3
votes
1 answer

If Java is inherently vulnerable to System.getProperty injection attacks, is it worth it to validate?

In Java it's common to see code such as System.getProperty('line.separator') which is used to build Strings used for output, etc. It has been recommended by vulnerability scanners that it is advisable to validate this input by e.g. ensuring it…
blindcodifier9734
  • 205
  • 1
  • 3
  • 5
3
votes
0 answers

How to fix Path Manipulation error in java which is raised in Fortify

How to fix Path Manipulation error in java which is raised in Fortify ? Please provide any inputs? I am getting the Path manipulation error in below line of my java file. new File(args[0])
user1548490
  • 31
  • 1
  • 2
3
votes
2 answers

Storing key store passwards

I am building an application that uses keystores as a way to securely store RSA keys and certificates. Obviously, I need a password to retrieve my private key. What is the proper way to store this password? I know, for example that burying it in the…
Dor Mesica
  • 133
  • 3
2
votes
1 answer

Vulnerability of Java software

The JAVA software provided by Oracle is a security mess. But what exactly, in that software package is the most vulnerable. If someone install it and disables the Java plugin in the browser, will he still be vulnerable?
Mayank Singh
  • 613
  • 1
  • 7
  • 11
2
votes
4 answers

Is serialisation of HashMaps secure?

I've done some reading in this area and there is very little information about the security of a HashMap. The only article I could find was on IBM's Developer Works site. What hashing function is used for HashMap in Java. That's really the most…
Ramonster
  • 121
  • 2
1
2 3