CAPEC-138: Reflection Injection

ID CAPEC-138
Typical Severity Very High
Status Draft

An adversary supplies a value to the target application which is then used by reflection methods to identify a class, method, or field. For example, in the Java programming language the reflection libraries permit an application to inspect, load, and invoke classes and their components by name. If an adversary can control the input into these methods including the name of the class/method/field or the parameters passed to methods, they can cause the targeted application to invoke incorrect methods, read random fields, or even to load and utilize malicious classes that the adversary created. This can lead to the application revealing sensitive information, returning incorrect results, or even having the adversary take control of the targeted application.

https://capec.mitre.org/data/definitions/138.html

Weaknesses

# ID Name Type
CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') weakness
Loading...