fix the qhelp

Co-authored-by: Asger F <asgerf@github.com>
This commit is contained in:
Erik Krogh Kristensen
2022-11-01 14:03:39 +01:00
committed by erik-krogh
parent 5e5160d4fc
commit 8fd6424db9

View File

@@ -15,8 +15,8 @@ the server.
<recommendation> <recommendation>
<p> <p>
Sanitize user input before passing it to the shell command by for example Sanitize user input before passing it to the shell command. For example,
ensuring that URLs are valid and do not contain malicious commands. ensure that URLs are valid and do not contain malicious commands.
</p> </p>
</recommendation> </recommendation>
@@ -30,7 +30,7 @@ URL that can be controlled by a malicious user.
<sample src="examples/second-order-command-injection.js" /> <sample src="examples/second-order-command-injection.js" />
<p> <p>
The problem has been fixed in the below where the URL is validated before The problem has been fixed in the snippet below, where the URL is validated before
being passed to the shell command. being passed to the shell command.
</p> </p>