mirror of
https://github.com/github/codeql.git
synced 2026-04-25 16:55:19 +02:00
docs wording updates
Co-authored-by: Ben Ahmady <32935794+subatoi@users.noreply.github.com>
This commit is contained in:
@@ -11,9 +11,9 @@ can cause file information disclosure by allowing an attacker to access unauthor
|
||||
</overview>
|
||||
<recommendation>
|
||||
|
||||
<p>To guard against untrusted URL forwarding, it is advisable to avoid putting user input
|
||||
directly into a forwarded URL. Instead, maintain a list of authorized
|
||||
URLs on the server; then choose from that list based on the user input provided.</p>
|
||||
<p>To guard against untrusted URL forwarding, you should avoid putting user input
|
||||
directly into a forwarded URL. Instead, you should maintain a list of authorized
|
||||
URLs on the server, then choose from that list based on the user input provided.</p>
|
||||
|
||||
</recommendation>
|
||||
<example>
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
/**
|
||||
* @name URL forward from a remote source
|
||||
* @description URL forward based on unvalidated user-input
|
||||
* @description URL forward based on unvalidated user input
|
||||
* may cause file information disclosure.
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
|
||||
Reference in New Issue
Block a user