Comment 3 for bug 917963

Revision history for this message
Thierry Carrez (ttx) wrote : Re: qweb.py (included with ajaxterm) allows arbitrary code execution

This doesn't look directly exploitable (without ability for attacker to create /tmp/qweb_sess_XXXX files) but I would agree that:

* At the very minimum, session files should be created in a different (non world-writeable) session directory
* qweb.py, and by extension ajaxterm, looks like a pretty weak piece of code (and not just in terms of security). If NoVNC really obsoletes it, we should get rid of it
* In all cases we shouldn't copy/ship ajaxterm code in Nova (bug 787094)

markmc, Vish: thoughts ?