CWE-578 - EJB Bad Practices: Use of Class Loader
CWE-578
- Abstraction:
- Variant
- Structure:
- Simple
- Status:
- Draft
- Weakness Name
EJB Bad Practices: Use of Class Loader
- Description
The product violates the Enterprise JavaBeans (EJB) specification by using the class loader.
The Enterprise JavaBeans specification requires that every bean provider follow a set of programming guidelines designed to ensure that the bean will be portable and behave consistently in any EJB container. In this case, the product violates the following EJB guideline: "The enterprise bean must not attempt to create a class loader; obtain the current class loader; set the context class loader; set security manager; create a new security manager; stop the JVM; or change the input, output, and error streams." The specification justifies this requirement in the following way: "These functions are reserved for the EJB container. Allowing the enterprise bean to use these functions could compromise security and decrease the container's ability to properly manage the runtime environment."
- Common Consequences
Scope: Confidentiality, Integrity, Availability, Other
Impact: Execute Unauthorized Code or Commands, Varies by Context
- Related Weaknesses
- Release Date:
- 2006-12-15
- Latest Modification Date:
- 2023-06-29
Free security scan for your website