mirror of
https://github.com/github/codeql.git
synced 2026-02-11 12:41:06 +01:00
Updated recommendations for avoiding JEXL injections
This commit is contained in:
@@ -14,8 +14,8 @@ and then evaluated, then it may allow the attacker to run arbitrary code.
|
||||
|
||||
<recommendation>
|
||||
<p>
|
||||
Including untrusted input in a JEXL expression should be avoided. If it is not possible,
|
||||
JEXL expressions should be run in a sandbox that allows accessing only
|
||||
It is generally recommended to avoid using untrusted input in a JEXL expression.
|
||||
If it is not possible, JEXL expressions should be run in a sandbox that allows accessing only
|
||||
explicitly allowed classes.
|
||||
</p>
|
||||
</recommendation>
|
||||
@@ -60,4 +60,4 @@ that checks if callees are instances of allowed classes.
|
||||
<a href="https://owasp.org/www-community/vulnerabilities/Expression_Language_Injection">Expression Language Injection</a>.
|
||||
</li>
|
||||
</references>
|
||||
</qhelp>
|
||||
</qhelp>
|
||||
|
||||
Reference in New Issue
Block a user