mirror of
https://github.com/github/codeql.git
synced 2025-12-21 03:06:31 +01:00
Apply suggestions from docs review
Co-authored-by: Sam Browning <106113886+sabrowning1@users.noreply.github.com>
This commit is contained in:
@@ -2,8 +2,8 @@
|
||||
<qhelp>
|
||||
|
||||
<overview>
|
||||
<p>If a <code>ResultReceiver</code> is obtained from an untrusted source, such as being unparcelled from an <code>Intent</code> that was received by an exported component,
|
||||
sensitive data such as passwords should not be sent to it. Otherwise, this sensitive information may be leaked to a malicious application.</p>
|
||||
<p>If a <code>ResultReceiver</code> is obtained from an untrusted source, such as an <code>Intent</code> received by an exported component,
|
||||
do not send it sensitive data. Otherwise, the information may be leaked to a malicious application.</p>
|
||||
</overview>
|
||||
|
||||
<recommendation>
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
/**
|
||||
* @name Leaking sensitive information through a ResultReceiver
|
||||
* @description An Android application obtains a ResultReceiver from a
|
||||
* third-party component and uses it to send sensitive data
|
||||
* @description Sending sensitive data to a 'ResultReceiver' from an untrusted source
|
||||
* can allow malicious actors access to your information.
|
||||
* @kind path-problem
|
||||
* @problem.severity error
|
||||
* @security-severity 8.2
|
||||
|
||||
Reference in New Issue
Block a user