Fix qhelp

This commit is contained in:
Tony Torralba
2022-08-30 16:27:22 +02:00
parent 76ea255277
commit 39b5ebfd7b

View File

@@ -28,12 +28,12 @@
</p>
</recommendation>
<example>
<p>
This example shows two ways of opening a file using a <code>ContentResolver</code>. In the first case, externally-provided
data coming from an intent is directly used in the file-reading operation, allowing an attacker to provide a URI
of the form <code>/data/data/(vulnerable app package)/(private file)</code> to trick the application into reading it and
copying it to the external storage. In the second case, the URI is validated before being used, making sure it does not reference
any internal application files.
<p>
</p>
<sample src="UnsafeContentUriResolution.java" />
</example>