Home / Vulnerability Database / Java : Unsafe reflection
Java
Java : Unsafe reflection
Classification
OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
PCI DSS 4.0
Overview
Insecure use of reflection: it is possible to execute arbitrary malicious code.
The method that implements reflection takes data from an untrusted source as an argument. This allows an attacker to control the application control flow graph, as well as to bypass authentication mechanisms and access restrictions.
The situation becomes especially dangerous if, in addition to the described vulnerability, an attacker can upload files into a directory that is present in the application’s classpath or edit the classpath. In this case, he/she can add arbitrary malicious code to the application and execute it.
MEDIUM
DerScanner Severity Score
Do you want to fix Java : Unsafe reflection in your application?
See also
Java
Java : Race condition
Java
Java : Text4Shell Vulnerability
Java
