mirror of
https://github.com/github/codeql.git
synced 2025-12-24 12:46:34 +01:00
Apply suggestions from code review
Co-authored-by: Chris Smowton <smowton@github.com>
This commit is contained in:
@@ -14,11 +14,10 @@ it results in remote code execution in the worst case.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
Here are examples of unsafe exporters: <code>HttpInvokerServiceExporter</code>,
|
||||
Examples of unsafe exporters include: <code>HttpInvokerServiceExporter</code>,
|
||||
<code>SimpleHttpInvokerServiceExporter</code>, <code>RmiServiceExporter</code>,
|
||||
<code>HessianServiceExporter</code>.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
CVE-2016-1000027 has been assigned to this issue in the Spring Framework.
|
||||
It is regarded as a design limitation, and can be mitigated but not fixed outright.
|
||||
@@ -34,4 +33,4 @@ consider using global deserialization filters introduced in JEP 290.
|
||||
</p>
|
||||
</recommendation>
|
||||
|
||||
</qhelp>
|
||||
</qhelp>
|
||||
|
||||
Reference in New Issue
Block a user