This vulnerability occurs when an application creates a temporary file in a directory that is too permissive, allowing unauthorized users or processes to see, access, or manipulate the file.
When a temporary file is placed in a directory with loose permissions (like world-readable or world-writable), other users or system actors can detect its presence. This simple act of discovery reveals which application created the file, offering a window into what the user is currently doing. Attackers can correlate this information with running processes to infer sensitive user activity, turning a seemingly minor information leak into a serious privacy breach. This issue is more than just a file access problem; it's an information exposure flaw that can enable targeted attacks. By knowing which application is in use, an attacker gains critical context to craft further exploits, potentially escalating privileges or accessing confidential data. Developers must ensure temporary files are created in secure, private locations with strict access controls to prevent this form of reconnaissance.
Impact: Read Application Data
Since the file is visible and the application which is using the temp file could be known, the attacker has gained information about what the user is doing at that time.
c
// write data to tmp file* ... // remove tmp file rmtmp();
javaLow