Python: Fix filenames in qhelp

This commit is contained in:
Rasmus Wriedt Larsen
2020-07-23 17:32:01 +02:00
committed by GitHub
parent e283d289fd
commit 03d22fa8e3

View File

@@ -13,10 +13,10 @@
</recommendation>
<example>
<p>Consider the example given below, an untrusted HTTP parameter `template` is used to generate a Jinja2 template string. This can lead to remote code execution. </p>
<sample src="jinjaBad.py" />
<sample src="JinjaBad.py" />
<p>Here we have fixed the problem by using the Jinja sandbox environment for evaluating untrusted code.</p>
<sample src="jinjaGood.py" />
<sample src="JinjaGood.py" />
</example>
<references>
<li>Portswigger : [Server Side Template Injection](https://portswigger.net/web-security/server-side-template-injection)</li>