This doesn't look directly exploitable (without ability for attacker to create /tmp/qweb_sess_XXXX files) but I would agree that:
* At the very minimum, session files should be created in a different (non world-writeable) session directory
* qweb.py, and by extension ajaxterm, looks like a pretty weak piece of code (and not just in terms of security). If NoVNC really obsoletes it, we should get rid of it
* In all cases we shouldn't copy/ship ajaxterm code in Nova (bug 787094)
This doesn't look directly exploitable (without ability for attacker to create /tmp/qweb_sess_XXXX files) but I would agree that:
* At the very minimum, session files should be created in a different (non world-writeable) session directory
* qweb.py, and by extension ajaxterm, looks like a pretty weak piece of code (and not just in terms of security). If NoVNC really obsoletes it, we should get rid of it
* In all cases we shouldn't copy/ship ajaxterm code in Nova (bug 787094)
markmc, Vish: thoughts ?