The product does not verify, or incorrectly verifies, the cryptographic signature for data.
N/A
Threat Mapped score: 0.0
Industry: Finiancial
Threat priority: Unclassified
CVE: CVE-2002-1796
Does not properly verify signatures for "trusted" entities.
CVE: CVE-2005-2181
Insufficient verification allows spoofing.
CVE: CVE-2005-2182
Insufficient verification allows spoofing.
CVE: CVE-2002-1706
Accepts a configuration file without a Message Integrity Check (MIC) signature.
N/A
Phase | Note |
---|---|
Architecture and Design | N/A |
Implementation | REALIZATION: This weakness is caused during implementation of an architectural security tactic. |
Intro: In the following code, a JarFile object is created from a downloaded file.
Body: The JAR file that was potentially downloaded from an untrusted source is created without verifying the signature (if present). An alternate constructor that accepts a boolean verify parameter should be used instead.
File f = new File(downloadedFilePath); JarFile jf = new JarFile(f);