[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CWE
view XML

Insecure Temporary File

ID: 377Date: (C)2012-05-14   (M)2022-10-10
Type: weaknessStatus: INCOMPLETE
Abstraction Type: Base





Description

Creating and using insecure temporary files can leave application and system data vulnerable to attack.

Applicable Platforms
Language Class: All

Time Of Introduction

  • Architecture and Design
  • Implementation

Common Consequences

ScopeTechnical ImpactNotes
Confidentiality
Integrity
 
Read files or directories
Modify files or directories
 
 

Detection Methods
None

Potential Mitigations
None

Relationships

Related CWETypeViewChain
CWE-377 ChildOf CWE-895 Category CWE-888  

Demonstrative Examples   (Details)

  1. The following code uses a temporary file for storing intermediate data gathered from the network before it is processed.

White Box Definitions
None

Black Box Definitions
None

Taxynomy Mappings

TaxynomyIdNameFit
7 Pernicious Kingdoms  Insecure Temporary File
 
 
CERT Java Secure Coding FIO00-J
 
Do not operate on files in shared directories
 
 

References:

  1. M. Howard D. LeBlanc .Writing Secure Code 2nd Edition. Microsoft. Section:'Chapter 23, "Creating Temporary Files Securely" Page 682'. Published on 2002.
  2. Mark Dowd John McDonald Justin Schuh .The Art of Software Security Assessment 1st Edition. Addison Wesley. Section:'Chapter 9, "Temporary Files", Page 538.'. Published on 2006.
  3. Mark Dowd John McDonald Justin Schuh .The Art of Software Security Assessment 1st Edition. Addison Wesley. Section:'Chapter 11, "File Squatting", Page 662.'. Published on 2006.
CVE    7
CVE-2012-2666
CVE-2021-20202
CVE-2021-25316
CVE-2020-8032
...

© SecPod Technologies