From 355cb6eeecb08916936b9f32f61734ca8f3f9eea Mon Sep 17 00:00:00 2001 From: intrigus-lgtm <60750685+intrigus-lgtm@users.noreply.github.com> Date: Wed, 16 Dec 2020 15:24:30 +0100 Subject: [PATCH] Fix Qhelp format Co-authored-by: Felicity Chapman --- .../src/Security/CWE/CWE-297/UnsafeHostnameVerification.qhelp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/java/ql/src/Security/CWE/CWE-297/UnsafeHostnameVerification.qhelp b/java/ql/src/Security/CWE/CWE-297/UnsafeHostnameVerification.qhelp index f8bfc87a9c3..cca6b6e4a5b 100644 --- a/java/ql/src/Security/CWE/CWE-297/UnsafeHostnameVerification.qhelp +++ b/java/ql/src/Security/CWE/CWE-297/UnsafeHostnameVerification.qhelp @@ -22,9 +22,9 @@ An attack would look like this:

Do not use an open HostnameVerifier. +

  • If you use an open verifier to solve a configuration problem with TLS/HTTPS you should solve the configuration problem instead.
  • -