< prev index next >

src/java.base/share/classes/java/net/NetPermission.java

Print this page

 49  *
 50  * <table class="striped">
 51  * <caption style="display:none">Permission target name, what the permission allows, and associated risks</caption>
 52  * <thead>
 53  * <tr>
 54  * <th scope="col">Permission Target Name</th>
 55  * <th scope="col">What the Permission Allows</th>
 56  * <th scope="col">Risks of Allowing this Permission</th>
 57  * </tr>
 58  * </thead>
 59  * <tbody>
 60  * <tr>
 61  *   <th scope="row">allowHttpTrace</th>
 62  *   <td>The ability to use the HTTP TRACE method in HttpURLConnection.</td>
 63  *   <td>Malicious code using HTTP TRACE could get access to security sensitive
 64  *   information in the HTTP headers (such as cookies) that it might not
 65  *   otherwise have access to.</td>
 66  *   </tr>
 67  *
 68  * <tr>










 69  *   <th scope="row">getCookieHandler</th>
 70  *   <td>The ability to get the cookie handler that processes highly
 71  *   security sensitive cookie information for an Http session.</td>
 72  *   <td>Malicious code can get a cookie handler to obtain access to
 73  *   highly security sensitive cookie information. Some web servers
 74  *   use cookies to save user private information such as access
 75  *   control information, or to track user browsing habit.</td>
 76  *   </tr>
 77  *
 78  * <tr>
 79  *   <th scope="row">getNetworkInformation</th>
 80  *   <td>The ability to retrieve all information about local network interfaces.</td>
 81  *   <td>Malicious code can read information about network hardware such as
 82  *   MAC addresses, which could be used to construct local IPv6 addresses.</td>
 83  * </tr>
 84  *
 85  * <tr>
 86  *   <th scope="row">getProxySelector</th>
 87  *   <td>The ability to get the proxy selector used to make decisions
 88  *   on which proxies to use when making network connections.</td>

 49  *
 50  * <table class="striped">
 51  * <caption style="display:none">Permission target name, what the permission allows, and associated risks</caption>
 52  * <thead>
 53  * <tr>
 54  * <th scope="col">Permission Target Name</th>
 55  * <th scope="col">What the Permission Allows</th>
 56  * <th scope="col">Risks of Allowing this Permission</th>
 57  * </tr>
 58  * </thead>
 59  * <tbody>
 60  * <tr>
 61  *   <th scope="row">allowHttpTrace</th>
 62  *   <td>The ability to use the HTTP TRACE method in HttpURLConnection.</td>
 63  *   <td>Malicious code using HTTP TRACE could get access to security sensitive
 64  *   information in the HTTP headers (such as cookies) that it might not
 65  *   otherwise have access to.</td>
 66  *   </tr>
 67  *
 68  * <tr>
 69  *   <th scope="row">accessUnixDomainSocket</th>
 70  *   <td>The ability to accept, bind, connect or get the local address
 71  *   of a <i>Unix Domain</i> socket.
 72  *   </td>
 73  *   <td>Malicious code could connect to local processes using Unix domain sockets
 74  *    or impersonate local processes, by binding to the same pathnames (assuming they
 75  *    have the required Operating System permissions.</td>
 76  * </tr>
 77  *
 78  * <tr>
 79  *   <th scope="row">getCookieHandler</th>
 80  *   <td>The ability to get the cookie handler that processes highly
 81  *   security sensitive cookie information for an Http session.</td>
 82  *   <td>Malicious code can get a cookie handler to obtain access to
 83  *   highly security sensitive cookie information. Some web servers
 84  *   use cookies to save user private information such as access
 85  *   control information, or to track user browsing habit.</td>
 86  *   </tr>
 87  *
 88  * <tr>
 89  *   <th scope="row">getNetworkInformation</th>
 90  *   <td>The ability to retrieve all information about local network interfaces.</td>
 91  *   <td>Malicious code can read information about network hardware such as
 92  *   MAC addresses, which could be used to construct local IPv6 addresses.</td>
 93  * </tr>
 94  *
 95  * <tr>
 96  *   <th scope="row">getProxySelector</th>
 97  *   <td>The ability to get the proxy selector used to make decisions
 98  *   on which proxies to use when making network connections.</td>
< prev index next >