-
Notifications
You must be signed in to change notification settings - Fork 74
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[security] Insecure usage of temporary files. #81
Comments
I'm not entirely sure what the attack vector is here? If the "starting user" is running a command line node.js app, they can presumably already "overwrite any file they have access to" with How would using |
Consider a shared host with two logins:
Because both users can write to If, instead |
That makes sense, thanks. |
Hi, thx for your nice Tool, but is there any Chance that this will be fixed soon? This marks other projects which use your outstanding tool as insecure on David batches, e.g. see https://david-dm.org/deadratfink/jy-transform/master. Best, Jens |
@chriso @skx: wouldn't using https://github.com/sindresorhus/tempfile be enough along with |
I'm proposing we resolve this by removing the functionality altogether. A little unorthodox, but you can see gh-86 for my rationale. |
This is resolved in |
Thanks, @chriso! |
The current code makes use of predictable filenames, in a way that causes a security issue.
I reported this to Debian last year:
It was recently highlighted by the nodesecurity people (six months later!):
Suggested fix:
~/.app.pid
would be better than/tmp
for example.The text was updated successfully, but these errors were encountered: