diff --git a/javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.qhelp b/javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.qhelp index 4c8ffa91d64..2cc0f1b33e7 100644 --- a/javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.qhelp +++ b/javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.qhelp @@ -15,8 +15,8 @@ the server.

-Sanitize user input before passing it to the shell command by for example -ensuring that URLs are valid and do not contain malicious commands. +Sanitize user input before passing it to the shell command. For example, +ensure that URLs are valid and do not contain malicious commands.

@@ -30,7 +30,7 @@ URL that can be controlled by a malicious user.

-The problem has been fixed in the below where the URL is validated before +The problem has been fixed in the snippet below, where the URL is validated before being passed to the shell command.