diff --git a/java/ql/src/Security/CWE/CWE-020/ExternalAPIsUsedWithUntrustedData.qhelp b/java/ql/src/Security/CWE/CWE-020/ExternalAPIsUsedWithUntrustedData.qhelp index a59de163b2a..4f04b90fa49 100644 --- a/java/ql/src/Security/CWE/CWE-020/ExternalAPIsUsedWithUntrustedData.qhelp +++ b/java/ql/src/Security/CWE/CWE-020/ExternalAPIsUsedWithUntrustedData.qhelp @@ -33,11 +33,11 @@ class to exclude known safe external APIs from future analysis.
If the query were to return the API javax.servlet.http.HttpServletResponse.sendError(int sc, java.lang.String msg) [param 1]
+
If the query were to return the API javax.servlet.http.HttpServletResponse.sendError(int, java.lang.String) [param 1]
then we should first consider whether this a security relevant sink. In this case, this is writing to a HTTP response, so we should
consider whether this is an XSS sink. If it is, we should confirm that it is handled by the XSS query.
If the query were to return the API java.lang.StringBuilder.append(java.lang.String str) [param 0], then this should be
+
If the query were to return the API java.lang.StringBuilder.append(java.lang.String) [param 0], then this should be
reviewed as a possible taint step, because tainted data would flow from the 0th argument to the qualifier of the call.
Note that both examples are correctly handled with the standard taint tracking library and XSS query.