Agreed--lots of the sensitive file handling here seems suboptimal and could stand to be fixed. I'm just trying to get a concise statement of what risks this presents (for inclusion in any advisory we might decide to release), and example attack vectors we can cite which are not completely contrived.
Agreed--lots of the sensitive file handling here seems suboptimal and could stand to be fixed. I'm just trying to get a concise statement of what risks this presents (for inclusion in any advisory we might decide to release), and example attack vectors we can cite which are not completely contrived.