Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-4073264

RMI and AppletViewer allow .class file redirects and JARs from other sites

XMLWordPrintable

    • Icon: Bug Bug
    • Resolution: Fixed
    • Icon: P1 P1
    • 1.1.5
    • 1.1.1
    • security-libs
    • None
    • 1.1.5
    • generic
    • generic
    • Verified

        Redirects happen in the networking layer, so sun.applet.AppletClassLoader
        happily allows them to happen. This leads to an attack where a site
        outside the firewall causes some class C to be loaded. The attacking
        server can redirect http://evil.com/C.class to some site behind the
        firewall -- say http://javaweb.eng.sun.com/C.class. Assuming it's there,
        now the applet (some of whose classes came from the attacking site) can access
        potentially sensitive information from C.class.

        Similarly, we allow Jar files to come from an arbitrary URL, at a host completely
        unrelated to the codebase. This leads to a similar attack.

              rschemersunw Roland Schemers (Inactive)
              bfootesunw Bill Foote (Inactive)
              Votes:
              0 Vote for this issue
              Watchers:
              0 Start watching this issue

                Created:
                Updated:
                Resolved:
                Imported:
                Indexed: