So yeah, um, this is not okay. It is not discoverable and could easily leak sensitive information. Auth credentials even, seriously? Also Chrome does this too. And it is preserved across `mv` to another filesystem.https://twitter.com/gynvael/status/1077671412847046657 …
-
-
That was fast! Wget 1.20.1 was just released with this behavior disabled by default, and made safer when enabled. We also have a CVE for it too, CVE-2018-20483. Thanks
@ruehsen!Show this threadThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Is there any interesting effect with electron apps?
-
Discord just seems to shell out to a web browser when clicked. Interestingly it hides the Basic credentials on the message when displayed (but they are preserved when clicked).
End of conversation
New conversation -
-
-
I suspect it will get marked as a dupe of https://crbug.com/733943 "do not store URLs in xattr" (private, but indexed in Google; somehow I've starred it despite not having access to it). Also reported to Debian over a year ago: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883746 …
-
When a bug is marked as a duplicate of a private bug, does the reporter of the duplicate gain permission to view the dupe target?
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
$ getfattr -d -m - test
user.xdg.origin.url="https://user:passwd@gynvael.coldwind.pl/"