We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 5e5160d commit 8fd6424Copy full SHA for 8fd6424
1 file changed
javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.qhelp
@@ -15,8 +15,8 @@ the server.
15
<recommendation>
16
17
<p>
18
-Sanitize user input before passing it to the shell command by for example
19
-ensuring that URLs are valid and do not contain malicious commands.
+Sanitize user input before passing it to the shell command. For example,
+ensure that URLs are valid and do not contain malicious commands.
20
</p>
21
22
</recommendation>
@@ -30,7 +30,7 @@ URL that can be controlled by a malicious user.
30
<sample src="examples/second-order-command-injection.js" />
31
32
33
-The problem has been fixed in the below where the URL is validated before
+The problem has been fixed in the snippet below, where the URL is validated before
34
being passed to the shell command.
35
36
0 commit comments