mirror of
https://github.com/github/codeql.git
synced 2026-05-02 04:05:14 +02:00
Use correct file names in SpringExporterUnsafeDeserialization.qhelp
This commit is contained in:
@@ -45,11 +45,11 @@ consider using global deserialization filters introduced in JEP 290.
|
||||
The following example shows how a vulnerable HTTP endpoint can be defined
|
||||
using <code>HttpInvokerServiceExporter</code> and Spring annotations:
|
||||
</p>
|
||||
<sample src="UnsafeHttpInvokerEndpoint.java" />
|
||||
<sample src="SpringExporterUnsafeDeserialization.java" />
|
||||
<p>
|
||||
The next examples shows how the same vulnerable endpoint can be defined in a Spring XML config:
|
||||
</p>
|
||||
<sample src="UnsafeHttpInvokerEndpoint.xml" />
|
||||
<sample src="SpringExporterUnsafeDeserialization.xml" />
|
||||
</example>
|
||||
|
||||
<references>
|
||||
|
||||
Reference in New Issue
Block a user