*** This bug is a security vulnerability ***

You have been subscribed to a public security bug by Marc Deslauriers 
(mdeslaur):

/usr/bin/getweb is vulnerable to "Insecure temporary file creation". [0]
While I don't know if anyone uses the getweb command. The script makes a 
temporary directory in /tmp called foo2zjs it then may download (depending on 
user input) one or more gzip and extract them in /tmp/foo2zjs.
However, the script does not check if the folder already exists / the return 
code of mkdir - so the script could possibly result in the over-writing of 
files or simply extra junk placed in $random places on the file-system.

[0] - http://cwe.mitre.org/data/definitions/377.html

[1] line 488
"
mkdir -p /tmp/foo2zjs
cd /tmp/foo2zjs
"

** Affects: foo2zjs (Ubuntu)
     Importance: Undecided
         Status: New

-- 
/usr/bin/getweb is vulnerable to "Insecure temporary file creation" weaknesses
https://bugs.launchpad.net/bugs/805370
You received this bug notification because you are a member of Ubuntu Bugs, 
which is subscribed to the bug report.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to