<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Benoit.dechateauvieux</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Benoit.dechateauvieux"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Benoit.dechateauvieux"/>
		<updated>2026-04-25T04:33:02Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EJB_Bad_Practices:_Use_of_Sockets&amp;diff=51414</id>
		<title>EJB Bad Practices: Use of Sockets</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EJB_Bad_Practices:_Use_of_Sockets&amp;diff=51414"/>
				<updated>2009-01-16T15:03:18Z</updated>
		
		<summary type="html">&lt;p&gt;Benoit.dechateauvieux: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
{{Template:Fortify}}&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
[[ASDR Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|This is the text from the old template. This needs to be rewritten using the new template.]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The program violates the Enterprise JavaBeans specification by listening on a socket or accept connections on a socket.&lt;br /&gt;
However it can act as a network socket client.&lt;br /&gt;
&lt;br /&gt;
The Enterprise JavaBeans specification requires that every bean provider follow a set of programming guidelines designed to ensure that the bean will be portable and behave consistently in any EJB container [1].&lt;br /&gt;
&lt;br /&gt;
In this case, the program violates the following EJB guideline:&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;An enterprise bean must not attempt to listen on a socket, accept connections on a socket, or use a socket for multicast.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
A requirement that the specification justifies in the following way:&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;The EJB architecture allows an enterprise bean instance to be a network socket client, but it does not allow it to be &lt;br /&gt;
  a network server. Allowing the instance to become a network server would conflict with the basic function of the &lt;br /&gt;
  enterprise bean – to serve the EJB clients.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Attack 1]]&lt;br /&gt;
* [[Attack 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Vulnerability 1]]&lt;br /&gt;
* [[Vulnerabiltiy 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* [[Control 1]]&lt;br /&gt;
* [[Control 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Technical Impacts]]==&lt;br /&gt;
&lt;br /&gt;
* [[Technical Impact 1]]&lt;br /&gt;
* [[Technical Impact 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* [1] Enterprise JavaBeans 2.1 Specification. Sun Microsystems. http://java.sun.com/products/ejb/docs.html.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|add links&lt;br /&gt;
&lt;br /&gt;
In addition, one should classify vulnerability based on the following subcategories: Ex:&amp;lt;nowiki&amp;gt;[[Category:Error Handling Vulnerability]]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Availability Vulnerability&lt;br /&gt;
&lt;br /&gt;
Authorization Vulnerability&lt;br /&gt;
&lt;br /&gt;
Authentication Vulnerability&lt;br /&gt;
&lt;br /&gt;
Concurrency Vulnerability&lt;br /&gt;
&lt;br /&gt;
Configuration Vulnerability&lt;br /&gt;
&lt;br /&gt;
Cryptographic Vulnerability&lt;br /&gt;
&lt;br /&gt;
Encoding Vulnerability&lt;br /&gt;
&lt;br /&gt;
Error Handling Vulnerability&lt;br /&gt;
&lt;br /&gt;
Input Validation Vulnerability&lt;br /&gt;
&lt;br /&gt;
Logging and Auditing Vulnerability&lt;br /&gt;
&lt;br /&gt;
Session Management Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
[[Category:Use of Dangerous API]]&lt;br /&gt;
[[Category:Java]]&lt;br /&gt;
[[Category:Implementation]]&lt;br /&gt;
[[Category:Communication]]&lt;br /&gt;
[[Category:API Abuse]]&lt;br /&gt;
[[Category:Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Benoit.dechateauvieux</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EJB_Bad_Practices:_Use_of_Sockets&amp;diff=51413</id>
		<title>EJB Bad Practices: Use of Sockets</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EJB_Bad_Practices:_Use_of_Sockets&amp;diff=51413"/>
				<updated>2009-01-16T15:02:50Z</updated>
		
		<summary type="html">&lt;p&gt;Benoit.dechateauvieux: /* Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
{{Template:Fortify}}&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
[[ASDR Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|This is the text from the old template. This needs to be rewritten using the new template.]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The program violates the Enterprise JavaBeans specification by listening on a socket or accept connections on a socket.&lt;br /&gt;
However it can as a network socket client.&lt;br /&gt;
&lt;br /&gt;
The Enterprise JavaBeans specification requires that every bean provider follow a set of programming guidelines designed to ensure that the bean will be portable and behave consistently in any EJB container [1].&lt;br /&gt;
&lt;br /&gt;
In this case, the program violates the following EJB guideline:&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;An enterprise bean must not attempt to listen on a socket, accept connections on a socket, or use a socket for multicast.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
A requirement that the specification justifies in the following way:&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;The EJB architecture allows an enterprise bean instance to be a network socket client, but it does not allow it to be &lt;br /&gt;
  a network server. Allowing the instance to become a network server would conflict with the basic function of the &lt;br /&gt;
  enterprise bean – to serve the EJB clients.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Attack 1]]&lt;br /&gt;
* [[Attack 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Vulnerability 1]]&lt;br /&gt;
* [[Vulnerabiltiy 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* [[Control 1]]&lt;br /&gt;
* [[Control 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Technical Impacts]]==&lt;br /&gt;
&lt;br /&gt;
* [[Technical Impact 1]]&lt;br /&gt;
* [[Technical Impact 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* [1] Enterprise JavaBeans 2.1 Specification. Sun Microsystems. http://java.sun.com/products/ejb/docs.html.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|add links&lt;br /&gt;
&lt;br /&gt;
In addition, one should classify vulnerability based on the following subcategories: Ex:&amp;lt;nowiki&amp;gt;[[Category:Error Handling Vulnerability]]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Availability Vulnerability&lt;br /&gt;
&lt;br /&gt;
Authorization Vulnerability&lt;br /&gt;
&lt;br /&gt;
Authentication Vulnerability&lt;br /&gt;
&lt;br /&gt;
Concurrency Vulnerability&lt;br /&gt;
&lt;br /&gt;
Configuration Vulnerability&lt;br /&gt;
&lt;br /&gt;
Cryptographic Vulnerability&lt;br /&gt;
&lt;br /&gt;
Encoding Vulnerability&lt;br /&gt;
&lt;br /&gt;
Error Handling Vulnerability&lt;br /&gt;
&lt;br /&gt;
Input Validation Vulnerability&lt;br /&gt;
&lt;br /&gt;
Logging and Auditing Vulnerability&lt;br /&gt;
&lt;br /&gt;
Session Management Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
[[Category:Use of Dangerous API]]&lt;br /&gt;
[[Category:Java]]&lt;br /&gt;
[[Category:Implementation]]&lt;br /&gt;
[[Category:Communication]]&lt;br /&gt;
[[Category:API Abuse]]&lt;br /&gt;
[[Category:Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Benoit.dechateauvieux</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EJB_Bad_Practices:_Use_of_Sockets&amp;diff=51410</id>
		<title>EJB Bad Practices: Use of Sockets</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EJB_Bad_Practices:_Use_of_Sockets&amp;diff=51410"/>
				<updated>2009-01-16T15:01:51Z</updated>
		
		<summary type="html">&lt;p&gt;Benoit.dechateauvieux: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
{{Template:Fortify}}&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
[[ASDR Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|This is the text from the old template. This needs to be rewritten using the new template.]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The program violates the Enterprise JavaBeans specification by listening on a socket or accept connections on a socket.&lt;br /&gt;
However it acts as network socket client.&lt;br /&gt;
&lt;br /&gt;
The Enterprise JavaBeans specification requires that every bean provider follow a set of programming guidelines designed to ensure that the bean will be portable and behave consistently in any EJB container [1].&lt;br /&gt;
&lt;br /&gt;
In this case, the program violates the following EJB guideline:&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;An enterprise bean must not attempt to listen on a socket, accept connections on a socket, or use a socket for multicast.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
A requirement that the specification justifies in the following way:&lt;br /&gt;
&lt;br /&gt;
  &amp;quot;The EJB architecture allows an enterprise bean instance to be a network socket client, but it does not allow it to be &lt;br /&gt;
  a network server. Allowing the instance to become a network server would conflict with the basic function of the &lt;br /&gt;
  enterprise bean – to serve the EJB clients.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[Attack 1]]&lt;br /&gt;
* [[Attack 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Vulnerability 1]]&lt;br /&gt;
* [[Vulnerabiltiy 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
* [[Control 1]]&lt;br /&gt;
* [[Control 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Related [[Technical Impacts]]==&lt;br /&gt;
&lt;br /&gt;
* [[Technical Impact 1]]&lt;br /&gt;
* [[Technical Impact 2]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* [1] Enterprise JavaBeans 2.1 Specification. Sun Microsystems. http://java.sun.com/products/ejb/docs.html.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:FIXME|add links&lt;br /&gt;
&lt;br /&gt;
In addition, one should classify vulnerability based on the following subcategories: Ex:&amp;lt;nowiki&amp;gt;[[Category:Error Handling Vulnerability]]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Availability Vulnerability&lt;br /&gt;
&lt;br /&gt;
Authorization Vulnerability&lt;br /&gt;
&lt;br /&gt;
Authentication Vulnerability&lt;br /&gt;
&lt;br /&gt;
Concurrency Vulnerability&lt;br /&gt;
&lt;br /&gt;
Configuration Vulnerability&lt;br /&gt;
&lt;br /&gt;
Cryptographic Vulnerability&lt;br /&gt;
&lt;br /&gt;
Encoding Vulnerability&lt;br /&gt;
&lt;br /&gt;
Error Handling Vulnerability&lt;br /&gt;
&lt;br /&gt;
Input Validation Vulnerability&lt;br /&gt;
&lt;br /&gt;
Logging and Auditing Vulnerability&lt;br /&gt;
&lt;br /&gt;
Session Management Vulnerability]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP ASDR Project]]&lt;br /&gt;
[[Category:Use of Dangerous API]]&lt;br /&gt;
[[Category:Java]]&lt;br /&gt;
[[Category:Implementation]]&lt;br /&gt;
[[Category:Communication]]&lt;br /&gt;
[[Category:API Abuse]]&lt;br /&gt;
[[Category:Vulnerability]]&lt;/div&gt;</summary>
		<author><name>Benoit.dechateauvieux</name></author>	</entry>

	</feed>