From 315480824bc65253aa58dffbaf2fec8641d4bf8d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Peter=20St=C3=B6ckli?= Date: Tue, 22 Nov 2022 11:25:10 +0100 Subject: [PATCH] Fix KernelOpen qhelp --- ruby/ql/src/queries/security/cwe-078/KernelOpen.inc.qhelp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/ruby/ql/src/queries/security/cwe-078/KernelOpen.inc.qhelp b/ruby/ql/src/queries/security/cwe-078/KernelOpen.inc.qhelp index add02f20bf3..2c220ba7aea 100644 --- a/ruby/ql/src/queries/security/cwe-078/KernelOpen.inc.qhelp +++ b/ruby/ql/src/queries/security/cwe-078/KernelOpen.inc.qhelp @@ -18,7 +18,7 @@ The same vulnerability applies to IO.read, IO.write, does not have this vulnerability. Similarly, use the methods from the File class instead of the IO class e.g. File.read instead of IO.read.

-

Instead of URI.open use URI().open or an HTTP Client.

+

Instead of URI.open use URI(..).open or an HTTP Client.