Course: Insecure Temporary Files (CWE-377)

Cover Image

In this course, we will look at CWE-377, which discusses the weaknesses caused by the usage of insecure temporary files.

This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. The course describes the security impact of the vulnerability. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.

At the end of this course, you will be able to:

  • Describe the insecure temporary file vulnerability.
  • Explain the security impact of using temporary files in an insecure manner.
  • Describe the technical aspects of using insecure temporary files, with examples.
  • Describe the remediation strategies to mitigate the problems described by CWE-377.
Nov 13, 2013
Already a Bitpipe member? Log in here

Download this Webcast!