The product compares classes by name, which can cause it to use the wrong class when multiple classes can have the same name.
If the decision to trust the methods and data of an object is based on the name of a class, it is possible for malicious users to send objects of the same name as trusted classes and thereby gain the trust afforded to known classes and types.
Impact: Execute Unauthorized Code or Commands
If a product relies solely on the name of an object to determine identity, it may execute the incorrect or unintended code.
java
// Do something assuming you trust inputClass*
javajava
// Do something assuming you trust inputClass*
javajava
// first check to see if the object is of the same class* if (obj.getClass().getName().equals(this.getClass().getName())) { ```
javajava
// first check to see if the object is of the same class* if (obj.getClass() == this.getClass()) { ``` ... } ... }
High