This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "EJB Bad Practices: Use of Sockets"

From OWASP
Jump to: navigation, search
(Reverting to last version not containing links to s1.shard.jp)
Line 1: Line 1:
[http://s1.shard.jp/galeach/new189.html big asian] [http://s1.shard.jp/galeach/new162.html asian escort girl london
 
] [http://s1.shard.jp/losaul/australia-jeri.html medicare australia homepage
 
] [http://s1.shard.jp/olharder/kragen-auto.html automountservers
 
] [http://s1.shard.jp/galeach/new28.html asian country english language official
 
] [http://s1.shard.jp/olharder/autopsy-picture.html addison automation force in sales
 
] [http://s1.shard.jp/losaul/australia-physiotherapy.html japanese car imports australia
 
] [http://s1.shard.jp/olharder/automotive-tool.html cheap online auto insurance quote
 
] [http://s1.shard.jp/bireba/www-avg-antivirus.html norton internet security leave antivirus
 
] [http://s1.shard.jp/olharder/autoimmune-hashimotos.html automatic coupler jaw
 
] [http://s1.shard.jp/frhorton/ybfhg5c59.html african board games
 
] [http://s1.shard.jp/olharder/autoroll-654.html sitemap] [http://s1.shard.jp/bireba/sofos-antivirus.html vista antivirus
 
] [http://s1.shard.jp/olharder/best-way-auto-care.html best way auto care] [http://s1.shard.jp/bireba/norotn-antivirus.html macfee antivirus free
 
] [http://s1.shard.jp/galeach/new173.html hope outreach ministries south asia
 
] [http://s1.shard.jp/olharder/auto-car-guys.html auto car guys] [http://s1.shard.jp/bireba/antivirus-services.html symetic antivirus
 
] [http://s1.shard.jp/frhorton/uu2d3yy8s.html business for sale in cape town south africa
 
] [http://s1.shard.jp/bireba/symantic-antivirus.html symantic antivirus download] [http://s1.shard.jp/frhorton/hzioyx6wv.html african forest in plant rain
 
] [http://s1.shard.jp/losaul/severe-droughts.html australian society indexer
 
] [http://s1.shard.jp/bireba/2005-antivirus.html reviews antivirus programs
 
] [http://s1.shard.jp/frhorton/po4uhk6ve.html african male lions
 
] [http://s1.shard.jp/olharder/autoroll-654.html http] [http://s1.shard.jp/olharder/automobile-chart.html auto expert midas svc
 
] [http://s1.shard.jp/olharder/jl-french-automotive.html auto body college repair state
 
] [http://s1.shard.jp/bireba/clam-win-antivirus.html microsoft antivirus software download
 
] [http://s1.shard.jp/frhorton/ds9o5dtz4.html africano de origen palabras
 
] [http://s1.shard.jp/losaul/vogue-australias.html job agents in australia
 
] [http://s1.shard.jp/frhorton/eustnj89y.html african braid picture
 
] [http://s1.shard.jp/bireba/symantec-antivirus.html avg antivirus programs
 
] [http://s1.shard.jp/olharder/auto-emissions-test.html bumper to bumper auto
 
] [http://s1.shard.jp/frhorton/2wh6r9nyq.html africa development ford foundation
 
] [http://s1.shard.jp/olharder/12-auto-become-br.html greenville auto accident lawyer
 
] [http://s1.shard.jp/olharder/automotive-training.html car transport auto shipping
 
] [http://s1.shard.jp/losaul/the-barrier-reef.html emirates airways australia
 
] [http://s1.shard.jp/bireba/norton-antivirus.html norton antivirus free download software] [http://s1.shard.jp/frhorton/4dqjbtjm2.html africanism records
 
] [http://s1.shard.jp/losaul/australian-bull.html marriage act australia
 
] [http://s1.shard.jp/olharder/autonomy-principal.html johns auto parts brampton
 
] [http://s1.shard.jp/losaul/used-car-price.html buy properties in australia
 
] [http://s1.shard.jp/losaul/auction-houses.html refrigeration jobs in australia
 
] [http://s1.shard.jp/galeach/new137.html clean air initiatives asia
 
] [http://s1.shard.jp/losaul/australian-gold.html gardening australia subscription
 
] [http://s1.shard.jp/frhorton/qtlusvqfk.html office of the presidency south africa
 
] [http://s1.shard.jp/galeach/new33.html asian figure skaters
 
] [http://s1.shard.jp/losaul/tents-australia.html tents australia] [http://s1.shard.jp/losaul/email-directory.html cable beach resort broome western australia
 
] [http://s1.shard.jp/bireba/antivirus-software.html symbian antivirus software
 
 
 
http://www.textrolchivarv.com  
 
http://www.textrolchivarv.com  
 
{{template:CandidateForDeletion}}
 
{{template:CandidateForDeletion}}
Line 67: Line 24:
 
   "The EJB architecture allows an enterprise bean instance to be a network socket client, but it does not allow it to be  
 
   "The EJB architecture allows an enterprise bean instance to be a network socket client, but it does not allow it to be  
 
   a network server. Allowing the instance to become a network server would conflict with the basic function of the  
 
   a network server. Allowing the instance to become a network server would conflict with the basic function of the  
   enterprise bean – to serve the EJB clients."
+
   enterprise bean – to serve the EJB clients."
  
 
==Risk Factors==
 
==Risk Factors==

Revision as of 15:59, 27 May 2009

http://www.textrolchivarv.com Template:CandidateForDeletion

#REDIRECT Failure to follow guideline/specification


Last revision (mm/dd/yy): 05/27/2009


Description

The program violates the Enterprise JavaBeans specification by listening on a socket or accept connections on a socket. However it can act as a network socket client.

The Enterprise JavaBeans specification requires that every bean provider follow a set of programming guidelines designed to ensure that the bean will be portable and behave consistently in any EJB container [1].

In this case, the program violates the following EJB guideline:

 "An enterprise bean must not attempt to listen on a socket, accept connections on a socket, or use a socket for multicast."

A requirement that the specification justifies in the following way:

 "The EJB architecture allows an enterprise bean instance to be a network socket client, but it does not allow it to be 
 a network server. Allowing the instance to become a network server would conflict with the basic function of the 
 enterprise bean – to serve the EJB clients."

Risk Factors

TBD

Examples

TBD

Related Attacks


Related Vulnerabilities


Related Controls


Related Technical Impacts


References