When an application exposes a remote interface for an entity bean, it might also expose methods that get or set the bean's data. These methods could be leveraged to read sensitive information, or to change data in ways that violate the application's expectations, potentially leading to other vulnerabilities.
|['Confidentiality', 'Integrity']||['Read Application Data', 'Modify Application Data']|
Declare Java beans "local" when possible. When a bean must be remotely accessible, make sure that sensitive information is not exposed, and ensure that the application logic performs appropriate validation of any data that might be modified by an attacker.
The following example demonstrates the weakness.
|映射的分类名||ImNode ID||Fit||Mapped Node Name|
|7 Pernicious Kingdoms||J2EE Misconfiguration: Unsafe Bean Declaration|
|Software Fault Patterns||SFP23||Exposed Data|