File tree Expand file tree Collapse file tree
java/ql/src/Security/CWE/CWE-200 Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -19,11 +19,11 @@ can occur.</p>
1919<recommendation >
2020<p >Use JDK methods that specifically protect against this vulnerability:</p >
2121<ul >
22- <li ><a href =" https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createTempDirectory" >java.nio.file.Files#createTempDirectory</a ></li >
23- <li ><a href =" https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createTempFile" >java.nio.file.Files#createTempFile</a ></li >
22+ <li ><a href =" https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createTempDirectory-java.nio.file.Path-java.lang.String-java.nio.file.attribute.FileAttribute...- " >java.nio.file.Files#createTempDirectory</a ></li >
23+ <li ><a href =" https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createTempFile-java.nio.file.Path-java.lang.String-java.lang.String-java.nio.file.attribute.FileAttribute...- " >java.nio.file.Files#createTempFile</a ></li >
2424</ul >
2525<p >Otherwise, create the file/directory by manually specificfying the expected posix file permissions.
26- Eg. <code >PosixFilePermissions.asFileAttribute(EnumSet.of(PosixFilePermission.OWNER_READ, PosixFilePermission.OWNER_WRITE))</code ></p >
26+ For example: <code >PosixFilePermissions.asFileAttribute(EnumSet.of(PosixFilePermission.OWNER_READ, PosixFilePermission.OWNER_WRITE))</code ></p >
2727<ul >
2828 <li ><a href =" https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createFile-java.nio.file.Path-java.nio.file.attribute.FileAttribute...-" >java.nio.file.Files#createFile</a ></li >
2929 <li ><a href =" https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createDirectory-java.nio.file.Path-java.nio.file.attribute.FileAttribute...-" >java.nio.file.Files#createDirectory</a ></li >
@@ -32,7 +32,7 @@ Eg. <code>PosixFilePermissions.asFileAttribute(EnumSet.of(PosixFilePermission.OW
3232</recommendation >
3333
3434<example >
35- <p >In the following example, files and directories are created with file permissions allowing other local users to read their contents.</p >
35+ <p >In the following example, files and directories are created with file permissions that allow other local users to read their contents.</p >
3636
3737<sample src =" TempDirUsageVulnerable.java" />
3838
Original file line number Diff line number Diff line change 11/**
2- * @name Temporary Directory Local information disclosure
3- * @description Detect local information disclosure via the java temporary directory
2+ * @name Temporary directory local information disclosure
3+ * @description Writing information without explicit permissions to a shared temporary directory may disclose it to other users.
44 * @kind problem
55 * @problem.severity warning
66 * @precision very-high
You can’t perform that action at this time.
0 commit comments