jacob-project
jacob-project copied to clipboard
Process Control (CWE ID 114) vulnerability in LibraryLoader.java
This Defect was copied from Sourceforge. LibraryLoader dynamically loads it's dll. https://github.com/freemansoft/jacob-project/blob/master/src/com/jacob/com/LibraryLoader.java
System.load(path);
System.loadLibrary(name);
This is by design. I'm not sure how we would fix it other than possibly finding a way of loading the dll directly from the JAR file.
Created: Mon Jan 29, 2018 07:11 AM UTC by Pavel Shelentsov Last Updated: Mon Jan 29, 2018 07:11 AM UTC
jacob_1.18.pdf (194.9 kB; application/pdf) Hello, We use JACOB in our project, and after sources analysis using static veracode analyzer we have found vulnerability in JACOB's sources:
Process Control vulnerability (CWE 114). In short: An argument to a process control function is either derived from an untrusted source or is hard-coded, both of which may allow an attacker to execute malicious code under certain conditions.
There are two occurrences of this flaw:
/com/jacob/com/LibraryLoader.java line: 151 /com/jacob/com/LibraryLoader.java line: 184
You can see detailed report in attached file.