# Usage of permissive file permission ('other')

## Overview

* **Rule ID**: `java_lang_file_permission_others`
* **Applicable Languages**: Java
* **Weakness ID**: CWE-732

## Description

Granting excessively permissive file permissions, particularly to the 'other' category, poses a significant security risk by potentially exposing sensitive information to unauthorized users.

## Remediation Guidelines

* **Ensur**e file permissions are set as strictly as required. Prioritize assigning permissions to 'groups' rather than 'others' to mitigate the risk of unauthorized access

  ```java
  permissions.add(PosixFilePermission.GROUP_WRITE)
  ```

## References

* [**Java Files class**](https://docs.oracle.com/en/java/javase/20/docs/api/java.base/java/nio/file/Files.html)
* [**Java PosixFilePermission enum**](https://docs.oracle.com/en/java/javase/20/docs/api/java.base/java/nio/file/attribute/PosixFilePermission.html)
* [**CWE-732: Incorrect Permission Assignment for Critical Resource**](https://cwe.mitre.org/data/definitions/732.html)

## Configuration

To omit this rule during a scan, and to provide you with continuous 24/7 code-level scanning, you can employ our [**SAST TOOL**](https://scopy.sec1.io/login)
