mirror of
https://github.com/github/codeql.git
synced 2026-04-30 11:15:13 +02:00
Fix qhelp
This commit is contained in:
@@ -28,12 +28,12 @@
|
||||
</p>
|
||||
</recommendation>
|
||||
<example>
|
||||
<p>
|
||||
This example shows two ways of opening a file using a <code>ContentResolver</code>. In the first case, externally-provided
|
||||
data coming from an intent is directly used in the file-reading operation, allowing an attacker to provide a URI
|
||||
of the form <code>/data/data/(vulnerable app package)/(private file)</code> to trick the application into reading it and
|
||||
copying it to the external storage. In the second case, the URI is validated before being used, making sure it does not reference
|
||||
any internal application files.
|
||||
<p>
|
||||
</p>
|
||||
<sample src="UnsafeContentUriResolution.java" />
|
||||
</example>
|
||||
|
||||
Reference in New Issue
Block a user