Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 7929fae

Browse files
Apply suggestions from code review
Co-authored-by: Felicity Chapman <[email protected]>
1 parent f910fd4 commit 7929fae

2 files changed

Lines changed: 6 additions & 6 deletions

File tree

java/ql/src/Security/CWE/CWE-200/TempDirLocalInformationDisclosure.qhelp

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,11 @@ can occur.</p>
1919
<recommendation>
2020
<p>Use JDK methods that specifically protect against this vulnerability:</p>
2121
<ul>
22-
<li><a href="https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createTempDirectory">java.nio.file.Files#createTempDirectory</a></li>
23-
<li><a href="https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createTempFile">java.nio.file.Files#createTempFile</a></li>
22+
<li><a href="https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createTempDirectory-java.nio.file.Path-java.lang.String-java.nio.file.attribute.FileAttribute...-">java.nio.file.Files#createTempDirectory</a></li>
23+
<li><a href="https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createTempFile-java.nio.file.Path-java.lang.String-java.lang.String-java.nio.file.attribute.FileAttribute...-">java.nio.file.Files#createTempFile</a></li>
2424
</ul>
2525
<p>Otherwise, create the file/directory by manually specificfying the expected posix file permissions.
26-
Eg. <code>PosixFilePermissions.asFileAttribute(EnumSet.of(PosixFilePermission.OWNER_READ, PosixFilePermission.OWNER_WRITE))</code></p>
26+
For example: <code>PosixFilePermissions.asFileAttribute(EnumSet.of(PosixFilePermission.OWNER_READ, PosixFilePermission.OWNER_WRITE))</code></p>
2727
<ul>
2828
<li><a href="https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createFile-java.nio.file.Path-java.nio.file.attribute.FileAttribute...-">java.nio.file.Files#createFile</a></li>
2929
<li><a href="https://docs.oracle.com/javase/8/docs/api/java/nio/file/Files.html#createDirectory-java.nio.file.Path-java.nio.file.attribute.FileAttribute...-">java.nio.file.Files#createDirectory</a></li>
@@ -32,7 +32,7 @@ Eg. <code>PosixFilePermissions.asFileAttribute(EnumSet.of(PosixFilePermission.OW
3232
</recommendation>
3333

3434
<example>
35-
<p>In the following example, files and directories are created with file permissions allowing other local users to read their contents.</p>
35+
<p>In the following example, files and directories are created with file permissions that allow other local users to read their contents.</p>
3636

3737
<sample src="TempDirUsageVulnerable.java"/>
3838

java/ql/src/Security/CWE/CWE-200/TempDirLocalInformationDisclosureFromMethodCall.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/**
2-
* @name Temporary Directory Local information disclosure
3-
* @description Detect local information disclosure via the java temporary directory
2+
* @name Temporary directory local information disclosure
3+
* @description Writing information without explicit permissions to a shared temporary directory may disclose it to other users.
44
* @kind problem
55
* @problem.severity warning
66
* @precision very-high

0 commit comments

Comments
 (0)