diff --git a/javascript/ql/src/Security/CWE-094/ImproperCodeSanitization.qhelp b/javascript/ql/src/Security/CWE-094/ImproperCodeSanitization.qhelp index b1d18387d21..d892f419af8 100644 --- a/javascript/ql/src/Security/CWE-094/ImproperCodeSanitization.qhelp +++ b/javascript/ql/src/Security/CWE-094/ImproperCodeSanitization.qhelp @@ -6,7 +6,7 @@

Using string concatenation to construct JavaScript code can be error-prone, or in the worst - case enable code-injection if an input is constructed by an attacker. + case, enable code injection if an input is constructed by an attacker.

@@ -20,14 +20,14 @@

- The below example constructs a function that assigns the number 42 to the property key + The example below constructs a function that assigns the number 42 to the property key on an object obj. However, if key contains </script>, then the generated code will break out of a <script> if the generated code is inserted into a <script> tag.

- The issue has been fixed in the below by escaping potentially dangerous characters. + The issue has been fixed by escaping potentially dangerous characters, as shown below.