mirror of
https://github.com/github/codeql.git
synced 2026-04-29 10:45:15 +02:00
Ruby: remove extra opening p tag
This commit is contained in:
@@ -17,11 +17,14 @@ use a sandboxed environment where access to unsafe attributes and methods is pro
|
||||
|
||||
<example>
|
||||
<p>
|
||||
<p>Consider the example given below, an untrusted HTTP parameter <code>name</code> is used to generate a template string. This can lead to remote code execution. </p>
|
||||
<sample src="examples/SSTIBad.rb" />
|
||||
|
||||
<p>Here we have fixed the problem by including ERB/Slim syntax in the string, then the user input will be rendered but no evaluated.</p>
|
||||
<sample src="examples/SSTIGood.rb" />
|
||||
Consider the example given below, an untrusted HTTP parameter <code>name</code> is used to generate a template string. This can lead to remote code execution.
|
||||
</p>
|
||||
<sample src="examples/SSTIBad.rb" />
|
||||
|
||||
<p>
|
||||
Here we have fixed the problem by including ERB/Slim syntax in the string, then the user input will be rendered but no evaluated.
|
||||
</p>
|
||||
<sample src="examples/SSTIGood.rb" />
|
||||
</example>
|
||||
|
||||
<references>
|
||||
@@ -32,4 +35,4 @@ Wikipedia: <a href="https://en.wikipedia.org/wiki/Code_injection#Server_Side_Tem
|
||||
Portswigger : <a href="https://portswigger.net/web-security/server-side-template-injection">Server Side Template Injection</a>.
|
||||
</li>
|
||||
</references>
|
||||
</qhelp>
|
||||
</qhelp>
|
||||
|
||||
Reference in New Issue
Block a user