include::../description.adoc[] include::../ask-yourself.adoc[] include::../recommended.adoc[] == Sensitive Code Example ---- file = open("/tmp/temporary_file","w+") # Sensitive ---- ---- tmp_dir = os.environ.get('TMPDIR') # Sensitive file = open(tmp_dir+"/temporary_file","w+") ---- == Compliant Solution ---- import tempfile file = tempfile.TemporaryFile(dir="/tmp/my_subdirectory", mode='"w+") # Compliant ---- == See * https://owasp.org/Top10/A01_2021-Broken_Access_Control/[OWASP Top 10 2021 Category A1] - Broken Access Control * https://www.owasp.org/index.php/Top_10-2017_A5-Broken_Access_Control[OWASP Top 10 2017 Category A5] - Broken Access Control * https://www.owasp.org/index.php/Top_10-2017_A3-Sensitive_Data_Exposure[OWASP Top 10 2017 Category A3] - Sensitive Data Exposure * https://cwe.mitre.org/data/definitions/377.html[MITRE, CWE-377] - Insecure Temporary File * https://cwe.mitre.org/data/definitions/379.html[MITRE, CWE-379] - Creation of Temporary File in Directory with Incorrect Permissions * https://www.owasp.org/index.php/Insecure_Temporary_File[OWASP, Insecure Temporary File] * https://docs.python.org/3/library/tempfile.html[Python tempfile module] ifdef::env-github,rspecator-view[] ''' == Implementation Specification (visible only on this page) include::../message.adoc[] ''' == Comments And Links (visible only on this page) include::../comments-and-links.adoc[] endif::env-github,rspecator-view[]