This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "J2EE Bad Practices: System.exit()"

From OWASP
Jump to: navigation, search
 
Line 1: Line 1:
 +
{{Template:Fortify}}
 
{{Template:Vulnerability}}
 
{{Template:Vulnerability}}
 +
 +
==Abstract==
 +
 +
A web application should not attempt to shut down its container.
  
 
==Description==
 
==Description==
 +
 +
It is never a good idea for a web application to attempt to shut down the application container. A call to System.exit() is probably part of leftover debug code or code imported from a non-J2EE application.
  
 
==Examples ==
 
==Examples ==
Line 14: Line 21:
  
 
==Categories==
 
==Categories==
 
{{Template:Stub}}
 
 
 
[[Category:Implementation]]
 
[[Category:Implementation]]
 
 
[[Category:Java]]
 
[[Category:Java]]
 +
[[Category:Use of Dangerous API]]

Revision as of 14:40, 19 July 2006

This article includes content generously donated to OWASP by MicroFocus Logo.png

This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.


Abstract

A web application should not attempt to shut down its container.

Description

It is never a good idea for a web application to attempt to shut down the application container. A call to System.exit() is probably part of leftover debug code or code imported from a non-J2EE application.

Examples

Related Threats

Related Attacks

Related Vulnerabilities

Related Countermeasures

Categories