src/jdk/internal/dynalink/beans/CallerSensitiveDetector.java

Wed, 03 Jul 2013 12:39:28 +0200

author
attila
date
Wed, 03 Jul 2013 12:39:28 +0200
changeset 404
18d467e94150
parent 0
b1a7da25b547
child 962
ac62e33a99b0
permissions
-rw-r--r--

8010946: AccessControl.doPrivileged is broken when called from js script
Reviewed-by: jlaskey, sundar

     1 /*
     2  * Copyright (c) 2010, 2013, Oracle and/or its affiliates. All rights reserved.
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
     4  *
     5  * This code is free software; you can redistribute it and/or modify it
     6  * under the terms of the GNU General Public License version 2 only, as
     7  * published by the Free Software Foundation.  Oracle designates this
     8  * particular file as subject to the "Classpath" exception as provided
     9  * by Oracle in the LICENSE file that accompanied this code.
    10  *
    11  * This code is distributed in the hope that it will be useful, but WITHOUT
    12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
    13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
    14  * version 2 for more details (a copy is included in the LICENSE file that
    15  * accompanied this code).
    16  *
    17  * You should have received a copy of the GNU General Public License version
    18  * 2 along with this work; if not, write to the Free Software Foundation,
    19  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
    20  *
    21  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
    22  * or visit www.oracle.com if you need additional information or have any
    23  * questions.
    24  */
    26 /*
    27  * This file is available under and governed by the GNU General Public
    28  * License version 2 only, as published by the Free Software Foundation.
    29  * However, the following notice accompanied the original version of this
    30  * file, and Oracle licenses the original version of this file under the BSD
    31  * license:
    32  */
    33 /*
    34    Copyright 2009-2013 Attila Szegedi
    36    Licensed under both the Apache License, Version 2.0 (the "Apache License")
    37    and the BSD License (the "BSD License"), with licensee being free to
    38    choose either of the two at their discretion.
    40    You may not use this file except in compliance with either the Apache
    41    License or the BSD License.
    43    If you choose to use this file in compliance with the Apache License, the
    44    following notice applies to you:
    46        You may obtain a copy of the Apache License at
    48            http://www.apache.org/licenses/LICENSE-2.0
    50        Unless required by applicable law or agreed to in writing, software
    51        distributed under the License is distributed on an "AS IS" BASIS,
    52        WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
    53        implied. See the License for the specific language governing
    54        permissions and limitations under the License.
    56    If you choose to use this file in compliance with the BSD License, the
    57    following notice applies to you:
    59        Redistribution and use in source and binary forms, with or without
    60        modification, are permitted provided that the following conditions are
    61        met:
    62        * Redistributions of source code must retain the above copyright
    63          notice, this list of conditions and the following disclaimer.
    64        * Redistributions in binary form must reproduce the above copyright
    65          notice, this list of conditions and the following disclaimer in the
    66          documentation and/or other materials provided with the distribution.
    67        * Neither the name of the copyright holder nor the names of
    68          contributors may be used to endorse or promote products derived from
    69          this software without specific prior written permission.
    71        THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS
    72        IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
    73        TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
    74        PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL COPYRIGHT HOLDER
    75        BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
    76        CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
    77        SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    78        BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    79        WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
    80        OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
    81        ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    82 */
    84 package jdk.internal.dynalink.beans;
    86 import java.lang.annotation.Annotation;
    87 import java.lang.reflect.AccessibleObject;
    88 import sun.reflect.CallerSensitive;
    90 /**
    91  * Utility class that determines if a method or constructor is caller sensitive. It actually encapsulates two different
    92  * strategies for determining caller sensitivity; a more robust one that works if Dynalink runs as code with access
    93  * to {@code sun.reflect} package, and an unprivileged one that is used when Dynalink doesn't have access to that
    94  * package. Note that even the unprivileged strategy is ordinarily robust, but it relies on the {@code toString} method
    95  * of the annotation. If an attacker were to use a different annotation to spoof the string representation of the
    96  * {@code CallerSensitive} annotation, they could designate their own methods as caller sensitive. This however does not
    97  * escalate privileges, only causes Dynalink to never cache method handles for such methods, so all it would do would
    98  * decrease the performance in linking such methods. In the opposite case when an attacker could trick Dynalink into not
    99  * recognizing genuine {@code CallerSensitive} annotations, Dynalink would treat caller sensitive methods as ordinary
   100  * methods, and would cache them bound to a zero-privilege delegate as the caller (just what Dynalink did before it
   101  * could handle caller-sensitive methods). That would practically render caller-sensitive methods exposed through
   102  * Dynalink unusable, but again, can not lead to any privilege escalations. Therefore, even the less robust unprivileged
   103  * strategy is safe; the worst thing a successful attack against it can achieve is slight reduction in Dynalink-exposed
   104  * functionality or performance.
   105  */
   106 public class CallerSensitiveDetector {
   108     private static final DetectionStrategy DETECTION_STRATEGY = getDetectionStrategy();
   110     static boolean isCallerSensitive(AccessibleObject ao) {
   111         return DETECTION_STRATEGY.isCallerSensitive(ao);
   112     }
   114     private static DetectionStrategy getDetectionStrategy() {
   115         try {
   116             return new PrivilegedDetectionStrategy();
   117         } catch(Throwable t) {
   118             return new UnprivilegedDetectionStrategy();
   119         }
   120     }
   122     private abstract static class DetectionStrategy {
   123         abstract boolean isCallerSensitive(AccessibleObject ao);
   124     }
   126     private static class PrivilegedDetectionStrategy extends DetectionStrategy {
   127         private static final Class<? extends Annotation> CALLER_SENSITIVE_ANNOTATION_CLASS = CallerSensitive.class;
   129         @Override
   130         boolean isCallerSensitive(AccessibleObject ao) {
   131             return ao.getAnnotation(CALLER_SENSITIVE_ANNOTATION_CLASS) != null;
   132         }
   133     }
   135     private static class UnprivilegedDetectionStrategy extends DetectionStrategy {
   136         private static final String CALLER_SENSITIVE_ANNOTATION_STRING = "@sun.reflect.CallerSensitive()";
   138         @Override
   139         boolean isCallerSensitive(AccessibleObject o) {
   140             for(Annotation a: o.getAnnotations()) {
   141                 if(String.valueOf(a).equals(CALLER_SENSITIVE_ANNOTATION_STRING)) {
   142                     return true;
   143                 }
   144             }
   145             return false;
   146         }
   147     }
   148 }

mercurial