Reliance on Package-level Scope |
| Weakness ID: 487 (Weakness Variant) | Status: Incomplete |
Description Summary
| Scope | Effect |
|---|---|
Confidentiality | Any data in a Java package can be accessed outside of the Java framework if the package is distributed. |
Integrity | The data in a Java class can be modified by anyone outside of the Java framework if the packages is distributed. |
Example 1
Design through Implementation: Data should be private static and final whenever possible. This will assure that your code is protected by instantiating early, preventing access and tampering. |
| The purpose of package scope is to prevent accidental access. However, this protection provides an ease-of-software-development feature but not a security feature, unless it is sealed. |
| Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
|---|---|---|---|---|
| ChildOf | Weakness Class | 485 | Insufficient Encapsulation | Development Concepts (primary)699 Research Concepts (primary)1000 |
| Submissions | ||||
|---|---|---|---|---|
| Submission Date | Submitter | Organization | Source | |
| CLASP | Externally Mined | |||
| Modifications | ||||
| Modification Date | Modifier | Organization | Source | |
| 2008-07-01 | Eric Dalci | Cigital | External | |
| updated Time of Introduction | ||||
| 2008-09-08 | CWE Content Team | MITRE | Internal | |
| updated Common Consequences, Relationships, Other Notes, Taxonomy Mappings | ||||
| Previous Entry Names | ||||
| Change Date | Previous Entry Name | |||
| 2008-04-11 | Relying on Package-level Scope | |||
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.