From 97dad2db1725349232539c98e2f31945c497422b Mon Sep 17 00:00:00 2001 From: Simon Friis Vindum Date: Thu, 27 Nov 2025 11:43:41 +0100 Subject: [PATCH] Rust: Apply suggestions from docs review Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com> --- rust/ql/src/queries/security/CWE-079/XSS.qhelp | 14 +++++++------- rust/ql/src/queries/security/CWE-079/XSS.ql | 2 +- 2 files changed, 8 insertions(+), 8 deletions(-) diff --git a/rust/ql/src/queries/security/CWE-079/XSS.qhelp b/rust/ql/src/queries/security/CWE-079/XSS.qhelp index 38c361bd62f..13b7c026f3c 100644 --- a/rust/ql/src/queries/security/CWE-079/XSS.qhelp +++ b/rust/ql/src/queries/security/CWE-079/XSS.qhelp @@ -4,8 +4,8 @@ -

Directly writing user input (for example, an HTTP request parameter) to a web -page, without properly sanitizing the input first, allows for a cross-site +

Directly writing user input (for example, an HTTP request parameter) to a webpage, +without properly sanitizing the input first, allows for a cross-site scripting vulnerability.

@@ -23,9 +23,9 @@ scripting:

To fix this vulnerability, the user input should be HTML-encoded before being -included in the response. In the following example encode_text from +included in the response. In the following example, encode_text from the html_escape -crate is used:

+crate is used to achieve this:

@@ -34,15 +34,15 @@ crate is used:

  • OWASP: - XSS - (Cross Site Scripting) Prevention Cheat Sheet. + +Cross Site Scripting Prevention Cheat Sheet.
  • Wikipedia: Cross-site scripting.
  • OWASP: - Cross-site Scripting (XSS). + Cross Site Scripting (XSS).
  • diff --git a/rust/ql/src/queries/security/CWE-079/XSS.ql b/rust/ql/src/queries/security/CWE-079/XSS.ql index 58fb77422ae..3c43f5043c7 100644 --- a/rust/ql/src/queries/security/CWE-079/XSS.ql +++ b/rust/ql/src/queries/security/CWE-079/XSS.ql @@ -1,6 +1,6 @@ /** * @name Cross-site scripting - * @description Writing user input directly to a web page + * @description Writing user input directly to a webpage * allows for a cross-site scripting vulnerability. * @kind path-problem * @problem.severity error