CVE-2014-0177: Temporary Directory Insecure Permissions Local Symlink File Overwrite
(updated )
Since the /tmp
directory is readable by everybody on Unix, and since the patch name could be public or easy to guess, an attacker could create a symlink to a file writable by the user running hub, which would be replaced by the patch.
References
Detect and mitigate CVE-2014-0177 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →