Our website uses cookies to enhance your browsing experience.
Accept
to the top
>
>
>
V1118. Excessive file permissions...
menu mobile close menu
Additional information
toggle menu Contents

V1118. Excessive file permissions can lead to vulnerabilities. Consider restricting file permissions.

May 19 2025

Excessive file permissions indicate security risks and may lead to vulnerabilities.

The analyzer checks the following system calls for excessive permissions: open, creat, openat, chmod, fchmod, fchmodat, mkdir, mkdirat, mkfifo, mkfifoat, mknod, mknodat, mq_open, and sem_open.

The example:

void foo(int param)
{
  int perms = 0777;
  int fd = open("/path/to/file", O_CREAT | O_RDONLY, perms);
  if (fd < 0) return;
 
  // some work

  close(fd);
}

The code uses the open system call to open a file and process the information it contains. If the file does not exist, it will be created via the O_CREAT flag in the second argument and have permissions specified by the number in the third argument. In this case, the 0777 mask allows any user to read, write, or execute this file, which can lead to vulnerabilities.

To fix the error, modify the permission mask:

void foo(int param)
{
  int perms = 0644;
  int fd = open("/path/to/file", O_CREAT | O_RDONLY, perms);
  if (fd < 0) return;
 
  // some work

  close(fd);
}

This diagnostic is classified as: