Use correct file names in SpringExporterUnsafeDeserialization.qhelp

This commit is contained in:
Artem Smotrakov
2021-03-06 22:07:43 +01:00
parent bda223771b
commit 891b975899

View File

@@ -45,11 +45,11 @@ consider using global deserialization filters introduced in JEP 290.
The following example shows how a vulnerable HTTP endpoint can be defined
using <code>HttpInvokerServiceExporter</code> and Spring annotations:
</p>
<sample src="UnsafeHttpInvokerEndpoint.java" />
<sample src="SpringExporterUnsafeDeserialization.java" />
<p>
The next examples shows how the same vulnerable endpoint can be defined in a Spring XML config:
</p>
<sample src="UnsafeHttpInvokerEndpoint.xml" />
<sample src="SpringExporterUnsafeDeserialization.xml" />
</example>
<references>