Many vulnerbilities involving files and file operations rely on a program anticipating that a file resides in a certain directory and then manipulating the file system in a way that makes that program access a different file than the intended. This is the technique used by many attacks targeting UNIX symlinks and Windows shortcuts. After
Once the correct file has been opened, it a program is no longer vulnerable to symlink vulnerableto these types of attacks so long as it the file is accessed via a file descriptor.
h2 Non-compliant Example 1
Code Block |
---|
h2 Compliant Solution 1
Code Block |
---|