This vulnerability occurs when code bypasses high-level framework controls by directly using low-level system functions, violating the intended security model.
Using low-level functions like direct memory access or OS system calls can disable the built-in safeguards of your application framework. This creates inconsistencies and unexpected behaviors that attackers can exploit to bypass security controls, corrupt data, or gain unauthorized access. Detecting these violations manually across a large codebase is challenging. An ASPM like Plexicus can automatically identify such patterns through SAST/DAST and use AI to provide specific remediation code, helping you maintain framework compliance and close security gaps efficiently.
Impact: Other
javacjava
// Perform servlet tasks.* ...
java
java