Merge branch 'jexl-injection' of github.com:artem-smotrakov/ql into jexl-injection

This commit is contained in:
Artem Smotrakov
2021-03-04 20:29:10 +01:00

View File

@@ -14,8 +14,8 @@ and then evaluated, then it may allow the attacker to run arbitrary code.
<recommendation>
<p>
Including untrusted input in a JEXL expression should be avoided. If it is not possible,
JEXL expressions should be run in a sandbox that allows accessing only
It is generally recommended to avoid using untrusted input in a JEXL expression.
If it is not possible, JEXL expressions should be run in a sandbox that allows accessing only
explicitly allowed classes.
</p>
</recommendation>
@@ -60,4 +60,4 @@ that checks if callees are instances of allowed classes.
<a href="https://owasp.org/www-community/vulnerabilities/Expression_Language_Injection">Expression Language Injection</a>.
</li>
</references>
</qhelp>
</qhelp>