From 8fd6424db9f0044bb2c5567bcc05c91d013b83f1 Mon Sep 17 00:00:00 2001 From: Erik Krogh Kristensen Date: Tue, 1 Nov 2022 14:03:39 +0100 Subject: [PATCH] fix the qhelp Co-authored-by: Asger F --- .../src/Security/CWE-078/SecondOrderCommandInjection.qhelp | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.qhelp b/javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.qhelp index 4c8ffa91d64..2cc0f1b33e7 100644 --- a/javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.qhelp +++ b/javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.qhelp @@ -15,8 +15,8 @@ the server.

-Sanitize user input before passing it to the shell command by for example -ensuring that URLs are valid and do not contain malicious commands. +Sanitize user input before passing it to the shell command. For example, +ensure that URLs are valid and do not contain malicious commands.

@@ -30,7 +30,7 @@ URL that can be controlled by a malicious user.

-The problem has been fixed in the below where the URL is validated before +The problem has been fixed in the snippet below, where the URL is validated before being passed to the shell command.