We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 0581f2f commit 9b372f3Copy full SHA for 9b372f3
1 file changed
go/ql/src/experimental/CWE-918/SSRF.qhelp
@@ -14,7 +14,7 @@ server side request forgery attacks, where the attacker controls the request tar
14
<p>
15
To guard against server side request forgery, it is advisable to avoid putting user input directly into a
16
network request. If using user input is necessary, then it must be validated. It is recommended to only allow
17
-user input consisting of alphanumeric characters. Simply URL-encoding other chracters is not always a solution,
+user input consisting of alphanumeric characters. Simply URL-encoding other characters is not always a solution,
18
for example because a downstream entity that is itself vulnerable may decode again before forwarding the request.
19
</p>
20
</recommendation>
0 commit comments