Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Insecure use of /tmp #81

Open
jwilk opened this issue Mar 4, 2018 · 2 comments · Fixed by MaG21/vim-anywhere#4
Open

Insecure use of /tmp #81

jwilk opened this issue Mar 4, 2018 · 2 comments · Fixed by MaG21/vim-anywhere#4

Comments

@jwilk
Copy link
Contributor

jwilk commented Mar 4, 2018

The way vim-anywhere uses /tmp is insecure. Malicious local user could create /tmp/vim-anywhere, make it writable to everyone, and then read or tamper with other users' files in this directory. In the worst case, when a victim uses vim-anywhere to create a shell script to be pasted to shell, they could end up with arbitrary code execution.

Please use mktemp -d for creating temporary directories.

@timbaileyjones
Copy link

The PR#4 for this issue was merged, but this ticket remains open.

Somebody wanna close it?

@StefanSchroeder
Copy link

For the record: This insecure use is captured in https://cwe.mitre.org/data/definitions/377.html

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants