CERT Java IDs mapped Klocwork Java checkers
The following mapping of CERT Java IDs to Klocwork Java checkers is a community-developed mapping.
Rule | Checker name and description |
---|---|
DCL02-J |
JD.UNMOD Modification of unmodifiable collection |
ENV03-J |
SV.CLEXT.POLICY Class extends 'java.security.Policy' |
ERR01-J |
SV.IL.DEV Design information leakage |
ERR03-J |
SV.HTTP_SPLIT Http Response Splitting SV.SSRF.URI URI based on invalidated user input. |
ERR04-J |
JD.FINRET Return inside finally |
ERR05-J |
JD.UNCAUGHT Uncaught exception |
ERR07-J |
EXC.BROADTHROWS Method has an overly broad throws declaration |
ERR08-J |
JD.CATCH Catching runtime exception |
ERR09-J |
SV.UMC.EXIT The System.exit() and Runtime.exit() method calls should not be used in servlets code UMC.EXIT The System.exit() method call is unwanted |
EXP00-J |
RI.IGNOREDCALL The value returned by a method called on immutable object is ignored RR.IGNORED The returned value is ignored |
EXP01-J |
NPE.COND Null pointer dereference where null comes from condition NPE.CONST Null pointer dereference where null comes from constant NPE.RET Dereference of a null value which is returned from a method NPE.RET.UTIL Dereference of a null value which is returned from a map or a collection NPE.STAT Null pointer dereference of a return value (statistical) REDUN.EQNULL Suspicious equals() called with expression and null (never true) |
EXP02-J |
JD.EQ.ARR Calling 'equals' on array |
EXP03-J |
CMP.OBJ Comparing objects with == |
FIO01-J |
SV.PERMS.HOME File created in user home directory, without setting permissions SV.PERMS.WIDE Too wide permissions |
FIO03-J |
SV.DOS.TMPFILEDEL Leaving temporary file for lifetime of JVM SV.DOS.TMPFILEEXIT Leaving temporary file |
FIO04-J |
RLK.AWT AWT object is not disposed on exit RLK.FIELD Possible leak of system resource stored in a field RLK.HIBERNATE Hibernate object is not closed on exit RLK.IMAGEIO ImageIO stream is not closed on exit RLK.IN Input stream is not closed on exit RLK.JNDI JNDI context is not closed on exit RLK.JPA {3} object is not closed on exit. RLK.MAIL Java mail object is not closed on exit RLK.MICRO Java Microedition connection is not closed on exit RLK.NIO NIO object is not closed on exit RLK.OUT Output stream is not closed on exit RLK.SOCK Socket is not closed on exit RLK.SQLCON Sql connection is not closed on exit RLK.SQLOBJ Sql object is not closed on exit RLK.SWT SWT object is not disposed on exit RLK.ZIP Zip file is not closed on exit |
FIO13-J |
SV.IL.SESSION Logging of session id |
FIO16-J |
SV.EXEC.PATH Untrusted Search Path SV.PATH Path and file name injection SV.PATH.INJ File injection SV.TMPFILE Temporary file path tampering |
IDS00-J |
SV.DATA.DB Data injection SV.SQL Sql Injection SV.SQL.DBSOURCE Unchecked information from the database is used in SQL statements |
IDS01-J |
SV.TAINT Tainted data SV.TAINT_NATIVE Tainted data goes to native code SV.XSS.DB Cross Site Scripting (Stored XSS) SV.XSS.REF Cross Site Scripting (Reflected XSS) |
IDS03-J |
SV.LOG_FORGING Log Forging |
IDS07-J |
SV.EXEC Process Injection SV.EXEC.DIR Process Injection. Working Directory SV.EXEC.ENV Process Injection. Environment Variables SV.EXEC.LOCAL Process Injection. Local Arguments SV.EXEC.PATH Untrusted Search Path |
IDS16-J |
JAVA.SV.XML.INVALID XML is not validated before being unmarshalled to a Java object |
IDS17-J |
SV.XXE.DBF Possibility for XML External Entity attack SV.XXE.SF Possibility for XML External Entity attack SV.XXE.SPF Possibility for XML External Entity attack SV.XXE.TF Possibility for XML External Entity attack SV.XXE.XIF Possibility for XML External Entity attack SV.XXE.XRF Possibility for XML External Entity attack |
JNI01-J |
SV.LOADLIB.INJ Untrusted call to 'loadLibrary' method |
LCK05-J |
SV.SHARED.VAR Unsynchronized access to static variable from servlet |
LCK07-J |
JD.LOCK Lock without unlock |
LCK09-J |
JD.LOCK.NOTIFY Method 'notify' called with locks held JD.LOCK.SLEEP Method 'sleep' called with locks held JD.LOCK.WAIT Method 'wait' called with locks held |
LCK10-J |
JD.SYNC.DCL Double-checked locking |
MET09-J |
EHC.EQ Class defines hashCode() but does not define equals() EHC.HASH Class defines equals() but does not define hashCode() |
MET12-J |
FIN.EMPTY Empty finalize() method should be removed FIN.NOSUPER Implementation of the finalize() method should call super.finalize() JD.UMC.FINALIZE Explicit call to method 'Object.finalize' JD.UMC.RUNFIN runFinalizersOnExit() is called SV.EXPOSE.FIN Method finalize() should have protected access modifier, not public |
MSC00-J |
SV.WEAK.TLS Weak SSL/TLS protocols should not be used. |
MSC02-J |
SV.RANDOM Use of insecure Random number generator |
MSC03-J |
SV.PASSWD.HC Hardcoded Password SV.PASSWD.HC.EMPTY Empty Password SV.PASSWD.PLAIN Plain-text Password SV.PASSWD.PLAIN.HC Plain-text Password SV.SENSITIVE.DATA Unencrypted sensitive data is written SV.SENSITIVE.OBJ Object with unencrypted sensitive data is stored |
MSC05-J |
JD.INF.ALLOC Allocation within infinite loop SV.DOS.ARRSIZE Tainted size used for array allocation SV.INT_OVF Tainted data may lead to Integer Overflow |
MSC06-J |
JD.CONCUR Possible ConcurrentModificationException |
MSC11-J |
SV.IL.SESSION Logging of session id SV.IL.SESSION.CLIENT HttpServletRequest.getRequestedSessionId method should not be used. SV.SESSION.FIXATION.COOKIE Cookies should not be vulnerable to session fixation SV.SPRING.FIXATION Session fixation protection is disabled |
NUM00-J |
SV.INT_OVF Tainted data may lead to Integer Overflow |
OBJ01-J |
SV.EXPOSE.FIELD Static field may be changed by malicious code SV.EXPOSE.IFIELD Instance field should be made final SV.EXPOSE.MUTABLEFIELD Static mutable field can be accessed by malicious code SV.STRUTS.PRIVATE Struts Forms: non-private fields SV.STRUTS.STATIC Struts Forms: static fields |
OBJ04-J |
SV.EXPOSE.RET Internal representation may be exposed SV.EXPOSE.STORE Method stores reference to mutable object |
OBJ05-J |
SV.EXPOSE.RET Internal representation may be exposed SV.EXPOSE.STORE Method stores reference to mutable object |
OBJ09-J |
CMP.CLASS Comparing by classname |
OBJ10-J |
SV.EXPOSE.FIELD Static field may be changed by malicious code SV.STRUTS.STATIC Struts Forms: static fields |
SEC00-J |
SV.PRIVILEGE.MISSING Method invoked should not be inside doPrivileged block |
SEC03-J |
SV.CLASSLOADER.INJ Class Loader URL Injection SV.CLEXT.CLLOADER Class extends 'java.lang.ClassLoader' SV.CLLOADER Direct use of Classloader |
SER01-J |
SV.SERIAL.SIG Methods readObject() and writeObject() in serializable classes should have correct signature |
SER03-J |
SV.SERIAL.NOFINAL Methods readObject() and writeObject() in serializable classes should be final SV.SERIAL.NOWRITE Method writeObject() should be defined for a serializable class |
SER06-J |
SV.SERIAL.NOFINAL Methods readObject() and writeObject() in serializable classes should be final SV.SERIAL.NOREAD Method readObject() should be defined for a serializable class |
SER09-J |
SV.SERIAL.OVERRIDE Do not invoke overridable methods from the readObject() method |
SER12-J |
SV.SERIAL.NOFINAL Methods readObject() and writeObject() in serializable classes should be final SV.SERIAL.NOREAD Method readObject() should be defined for a serializable class |
THI00-J |
JD.THREAD.RUN Explicit call to a 'Thread.run' method |
VNA00-J |
SV.SHARED.VAR Unsynchronized access to static variable from servlet |
VNA01-J |
SV.SHARED.VAR Unsynchronized access to static variable from servlet |
VNA02-J |
SV.SHARED.VAR Unsynchronized access to static variable from servlet |