Skip to content

False Negative: Unsafe hostname verification is under-modeled in anonymous classes, lambdas, and API variants. #21556

@Carlson-JLQ

Description

@Carlson-JLQ

False Negative: Unsafe hostname verification is under-modeled in anonymous classes, lambdas, and API variants.

Version
codeql 2.24.3

Checker

  • Checker id: Security/CWE/CWE-297/UnsafeHostnameVerification.ql
  • Checker description: This checker detects hostname verifier implementations that always accept any certificate regardless of hostname mismatch, potentially enabling man-in-the-middle attacks.

Description of the false negative

diff/output marks 10 false negatives for Security/CWE/CWE-297/UnsafeHostnameVerification.ql. Across these samples, the benchmark is still exercising the same underlying bug pattern, but the implementation appears to lose track of it once the source deviates from one canonical shape. The recurring themes are suppression or annotations.

Affected test cases

PosCase1.java

Source: output/sonarqube/VerifiedServerHostnamesCheck/src/main/java/scensct/core/pos/PosCase1.java

The sample keeps the benchmark's target pattern but expresses it in a slightly non-canonical source form. The risky pattern is still present in the code, so the absence of a report points to a matching gap rather than a benign variant. That is also how the benchmark classifies the sample: A class implementing HostnameVerifier with verify method returning true should be flagged as insecure.

// A class implementing HostnameVerifier with verify method returning true should be flagged as insecure.
package scensct.core.pos;

import javax.net.ssl.HostnameVerifier;
import javax.net.ssl.SSLSession;

public class PosCase1 implements HostnameVerifier {
    @Override
    public boolean verify(String hostname, SSLSession session) {
        return true; // Scenario 1: verify method body is solely return true; // [REPORTED LINE]
    }
}

PosCase10.java

Source: output/sonarqube/VerifiedServerHostnamesCheck/src/main/java/scensct/core/pos/PosCase10.java

The sample keeps the benchmark's target pattern but expresses it in a slightly non-canonical source form. The risky pattern is still present in the code, so the absence of a report points to a matching gap rather than a benign variant. That is also how the benchmark classifies the sample: A Hashtable object invoking put with SSL socket factory key and other put calls on same Hashtable, none with checkserveridentity key, should be flagged as insecure.

// A Hashtable object invoking put with SSL socket factory key and other put calls on same Hashtable, none with checkserveridentity key, should be flagged as insecure.
package scensct.core.pos;

import java.util.Hashtable;

public class PosCase10 {
    public void configure() {
        Hashtable<String, String> props = new Hashtable<>();
        props.put("mail.smtp.socketFactory.class", "javax.net.ssl.SSLSocketFactory"); // Scenario 10: put with SSL factory // [REPORTED LINE]
        props.put("mail.smtp.host", "smtp.example.com"); // other put call, not with checkserveridentity key
    }
}

PosCase2.java

Source: output/sonarqube/VerifiedServerHostnamesCheck/src/main/java/scensct/core/pos/PosCase2.java

The sample keeps the benchmark's target pattern but expresses it in a slightly non-canonical source form. The risky pattern is still present in the code, so the absence of a report points to a matching gap rather than a benign variant. That is also how the benchmark classifies the sample: A lambda expression assigned to HostnameVerifier with non-block body literal true should be flagged as insecure.

// A lambda expression assigned to HostnameVerifier with non-block body literal true should be flagged as insecure.
package scensct.core.pos;

import javax.net.ssl.HostnameVerifier;

public class PosCase2 {
    public static void main(String[] args) {
        HostnameVerifier verifier = (hostname, session) -> true; // Scenario 2: lambda with non-block body true // [REPORTED LINE]
    }
}

PosCase3.java

Source: output/sonarqube/VerifiedServerHostnamesCheck/src/main/java/scensct/core/pos/PosCase3.java

The sample keeps the benchmark's target pattern but expresses it in a slightly non-canonical source form. The risky pattern is still present in the code, so the absence of a report points to a matching gap rather than a benign variant. That is also how the benchmark classifies the sample: A lambda expression assigned to HostnameVerifier with block body containing only return true should be flagged as insecure.

// A lambda expression assigned to HostnameVerifier with block body containing only return true should be flagged as insecure.
package scensct.core.pos;

import javax.net.ssl.HostnameVerifier;

public class PosCase3 {
    public static void main(String[] args) {
        HostnameVerifier verifier = (hostname, session) -> {
            return true; // Scenario 3: lambda block body with only return true; // [REPORTED LINE]
        };
    }
}

PosCase4.java

Source: output/sonarqube/VerifiedServerHostnamesCheck/src/main/java/scensct/core/pos/PosCase4.java

The sample keeps the benchmark's target pattern but expresses it in a slightly non-canonical source form. The risky pattern is still present in the code, so the absence of a report points to a matching gap rather than a benign variant. That is also how the benchmark classifies the sample: An Email object invoking setSSL(true) with no other method invocations in the method should be flagged as insecure.

// An Email object invoking setSSL(true) with no other method invocations in the method should be flagged as insecure.
package scensct.core.pos;

import org.apache.commons.mail.Email;
import org.apache.commons.mail.SimpleEmail;

public class PosCase4 {
    public void sendEmail() {
        Email email = new SimpleEmail();
        email.setSSL(true); // Scenario 4: only method call in method // [REPORTED LINE]
    }
}

PosCase5.java

Source: output/sonarqube/VerifiedServerHostnamesCheck/src/main/java/scensct/core/pos/PosCase5.java

The sample keeps the benchmark's target pattern but expresses it in a slightly non-canonical source form. The risky pattern is still present in the code, so the absence of a report points to a matching gap rather than a benign variant. That is also how the benchmark classifies the sample: An Email object invoking setSSL(true) with no other method invocations on that same object in the method should be flagged as insecure.

// An Email object invoking setSSL(true) with no other method invocations on that same object in the method should be flagged as insecure.
package scensct.core.pos;

import org.apache.commons.mail.Email;
import org.apache.commons.mail.SimpleEmail;

public class PosCase5 {
    public void sendEmail() {
        Email email = new SimpleEmail();
        email.setSSL(true); // Scenario 5: no other calls on this email object // [REPORTED LINE]
        String str = "test";
        str.length(); // call on other object is allowed
    }
}

PosCase6.java

Source: output/sonarqube/VerifiedServerHostnamesCheck/src/main/java/scensct/core/pos/PosCase6.java

The sample keeps the benchmark's target pattern but expresses it in a slightly non-canonical source form. The risky pattern is still present in the code, so the absence of a report points to a matching gap rather than a benign variant. That is also how the benchmark classifies the sample: An Email object invoking setSSL(true) with other method calls on same object, none being setSSLCheckServerIdentity, should be flagged as insecure.

// An Email object invoking setSSL(true) with other method calls on same object, none being setSSLCheckServerIdentity, should be flagged as insecure.
package scensct.core.pos;

import org.apache.commons.mail.Email;
import org.apache.commons.mail.SimpleEmail;

public class PosCase6 {
    public void sendEmail() {
        Email email = new SimpleEmail();
        email.setSSL(true); // Scenario 6: setSSL called // [REPORTED LINE]
        email.setHostName("smtp.example.com"); // other call on same object, not setSSLCheckServerIdentity
    }
}

PosCase7.java

Source: output/sonarqube/VerifiedServerHostnamesCheck/src/main/java/scensct/core/pos/PosCase7.java

The sample keeps the benchmark's target pattern but expresses it in a slightly non-canonical source form. The risky pattern is still present in the code, so the absence of a report points to a matching gap rather than a benign variant. That is also how the benchmark classifies the sample: A Hashtable object invoking put with SSL socket factory key and no other method invocations in the method should be flagged as insecure.

// A Hashtable object invoking put with SSL socket factory key and no other method invocations in the method should be flagged as insecure.
package scensct.core.pos;

import java.util.Hashtable;

public class PosCase7 {
    public void configure() {
        Hashtable<String, String> props = new Hashtable<>();
        props.put("mail.smtp.socketFactory.class", "javax.net.ssl.SSLSocketFactory"); // Scenario 7: only method call in method // [REPORTED LINE]
    }
}

PosCase8.java

Source: output/sonarqube/VerifiedServerHostnamesCheck/src/main/java/scensct/core/pos/PosCase8.java

The sample keeps the benchmark's target pattern but expresses it in a slightly non-canonical source form. The risky pattern is still present in the code, so the absence of a report points to a matching gap rather than a benign variant. That is also how the benchmark classifies the sample: A Hashtable object invoking put with SSL socket factory key and no other method invocations on that same Hashtable in the method should be flagged as insecure.

// A Hashtable object invoking put with SSL socket factory key and no other method invocations on that same Hashtable in the method should be flagged as insecure.
package scensct.core.pos;

import java.util.Hashtable;

public class PosCase8 {
    public void configure() {
        Hashtable<String, String> props = new Hashtable<>();
        props.put("mail.smtp.socketFactory.class", "javax.net.ssl.SSLSocketFactory"); // Scenario 8: no other calls on this Hashtable // [REPORTED LINE]
        String s = "test";
        s.length(); // call on other object is allowed
    }
}

PosCase9.java

Source: output/sonarqube/VerifiedServerHostnamesCheck/src/main/java/scensct/core/pos/PosCase9.java

The sample keeps the benchmark's target pattern but expresses it in a slightly non-canonical source form. The risky pattern is still present in the code, so the absence of a report points to a matching gap rather than a benign variant. That is also how the benchmark classifies the sample: A Hashtable object invoking put with SSL socket factory key and other method calls on same Hashtable, none being put, should be flagged as insecure.

// A Hashtable object invoking put with SSL socket factory key and other method calls on same Hashtable, none being put, should be flagged as insecure.
package scensct.core.pos;

import java.util.Hashtable;

public class PosCase9 {
    public void configure() {
        Hashtable<String, String> props = new Hashtable<>();
        props.put("mail.smtp.socketFactory.class", "javax.net.ssl.SSLSocketFactory"); // Scenario 9: put with SSL factory // [REPORTED LINE]
        props.size(); // other call on same Hashtable, not a put method
    }
}

Cause analysis

The rule is documented as follows: This checker detects hostname verifier implementations that always accept any certificate regardless of hostname mismatch, potentially enabling man-in-the-middle attacks.

In this set the problem shows up around suppression or annotations. The missed cases suggest that the implementation is narrower than the rule description and too dependent on one preferred AST shape.

Once the same behavior is expressed through a helper, an overload, a modifier such as abstract or native, a different comment position, or a slightly rearranged control-flow structure, the report disappears even though the benchmark still treats the case as in-scope.

For Security/CWE/CWE-297/UnsafeHostnameVerification.ql, the practical improvement would be to generalize the match so it follows the underlying behavior rather than one exact spelling of it.

References

None known.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions