mirror of
https://github.com/github/codeql.git
synced 2025-12-21 03:06:31 +01:00
JavaScript: Address review comments.
This commit is contained in:
@@ -31,6 +31,7 @@
|
|||||||
|
|
||||||
| **Query** | **Expected impact** | **Change** |
|
| **Query** | **Expected impact** | **Change** |
|
||||||
|--------------------------------|------------------------------|---------------------------------------------------------------------------|
|
|--------------------------------|------------------------------|---------------------------------------------------------------------------|
|
||||||
|
| Double escaping or unescaping (`js/double-escaping`) | More results | This rule now detects additional escaping and unescaping functions. |
|
||||||
| Incomplete string escaping or encoding (`js/incomplete-sanitization`) | Fewer false-positive results | This rule now recognizes additional ways delimiters can be stripped away. |
|
| Incomplete string escaping or encoding (`js/incomplete-sanitization`) | Fewer false-positive results | This rule now recognizes additional ways delimiters can be stripped away. |
|
||||||
| Client-side cross-site scripting (`js/xss`) | More results, fewer false-positive results | More potential vulnerabilities involving functions that manipulate DOM attributes are now recognized, and more sanitizers are detected. |
|
| Client-side cross-site scripting (`js/xss`) | More results, fewer false-positive results | More potential vulnerabilities involving functions that manipulate DOM attributes are now recognized, and more sanitizers are detected. |
|
||||||
| Code injection (`js/code-injection`) | More results | More potential vulnerabilities involving functions that manipulate DOM event handler attributes are now recognized. |
|
| Code injection (`js/code-injection`) | More results | More potential vulnerabilities involving functions that manipulate DOM event handler attributes are now recognized. |
|
||||||
|
|||||||
@@ -10,8 +10,8 @@ attacks such as cross-site scripting. One particular example of this is HTML ent
|
|||||||
where HTML special characters are replaced by HTML character entities to prevent them from being
|
where HTML special characters are replaced by HTML character entities to prevent them from being
|
||||||
interpreted as HTML markup. For example, the less-than character is encoded as <code>&lt;</code>
|
interpreted as HTML markup. For example, the less-than character is encoded as <code>&lt;</code>
|
||||||
and the double-quote character as <code>&quot;</code>.
|
and the double-quote character as <code>&quot;</code>.
|
||||||
Other examples include backslash-escaping for including untrusted data in string literals and
|
Other examples include backslash escaping or JSON encoding for including untrusted data in string
|
||||||
percent-encoding for URI components.
|
literals, and percent-encoding for URI components.
|
||||||
</p>
|
</p>
|
||||||
<p>
|
<p>
|
||||||
The reverse process of replacing escape sequences with the characters they represent is known as
|
The reverse process of replacing escape sequences with the characters they represent is known as
|
||||||
|
|||||||
Reference in New Issue
Block a user