Skip to content

Commit 220ff3c

Browse files
committed
convert tabs to spaces in qhelp
1 parent 712805f commit 220ff3c

File tree

4 files changed

+80
-80
lines changed

4 files changed

+80
-80
lines changed

java/ql/src/Security/CWE/CWE-020/OverlyLargeRange.qhelp

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@
33
"qhelp.dtd">
44
<qhelp>
55

6-
<overview>
7-
<p>
8-
A regexp range can by accident match more than was intended.
6+
<overview>
7+
<p>
8+
A regexp range can by accident match more than was intended.
99
For example, the regular expression <code>/[a-zA-z]/</code> will
1010
match every lowercase and uppercase letters, but the same regular
1111
expression will also match the chars: <code>[\]^_`</code>.
12-
</p>
12+
</p>
1313
<p>
1414
On other occasions it can happen that the dash in a regular
1515
expression is not escaped, which will cause it to be interpreted
@@ -18,22 +18,22 @@
1818
<code>,</code> and <code>_</code> (both included), which overlaps with the
1919
range <code>[0-9]</code> and is thus clearly not intended.
2020
</p>
21-
</overview>
21+
</overview>
2222

23-
<recommendation>
24-
<p>
23+
<recommendation>
24+
<p>
2525

26-
Don't write character ranges were there might be confusion as to
26+
Don't write character ranges were there might be confusion as to
2727
which characters are included in the range.
2828

29-
</p>
30-
</recommendation>
29+
</p>
30+
</recommendation>
3131

32-
<example>
32+
<example>
3333

34-
<p>
34+
<p>
3535
The following example code checks whether a string is a valid 6 digit hex color.
36-
</p>
36+
</p>
3737

3838
<sample language="java">
3939
import java.util.regex.Pattern
@@ -44,7 +44,7 @@ public class Tester {
4444
}
4545
</sample>
4646

47-
<p>
47+
<p>
4848
However, the <code>A-f</code> range matches every uppercase character, and
4949
thus a "color" like <code>#XYZ</code> is considered valid.
5050
</p>
@@ -62,11 +62,11 @@ public class Tester {
6262
}
6363
</sample>
6464

65-
</example>
65+
</example>
6666

67-
<references>
68-
<li>Mitre.org: <a href="https://cwe.mitre.org/data/definitions/20.html">CWE-020</a></li>
69-
<li>github.com: <a href="https://github.com/advisories/GHSA-g4rg-993r-mgx7">CVE-2021-42740</a></li>
70-
<li>wh0.github.io: <a href="https://wh0.github.io/2021/10/28/shell-quote-rce-exploiting.html">Exploiting CVE-2021-42740</a></li>
71-
</references>
67+
<references>
68+
<li>Mitre.org: <a href="https://cwe.mitre.org/data/definitions/20.html">CWE-020</a></li>
69+
<li>github.com: <a href="https://github.com/advisories/GHSA-g4rg-993r-mgx7">CVE-2021-42740</a></li>
70+
<li>wh0.github.io: <a href="https://wh0.github.io/2021/10/28/shell-quote-rce-exploiting.html">Exploiting CVE-2021-42740</a></li>
71+
</references>
7272
</qhelp>

javascript/ql/src/Security/CWE-020/OverlyLargeRange.qhelp

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@
33
"qhelp.dtd">
44
<qhelp>
55

6-
<overview>
7-
<p>
8-
A regexp range can by accident match more than was intended.
6+
<overview>
7+
<p>
8+
A regexp range can by accident match more than was intended.
99
For example, the regular expression <code>/[a-zA-z]/</code> will
1010
match every lowercase and uppercase letters, but the same regular
1111
expression will also match the chars: <code>[\]^_`</code>.
12-
</p>
12+
</p>
1313
<p>
1414
On other occasions it can happen that the dash in a regular
1515
expression is not escaped, which will cause it to be interpreted
@@ -18,30 +18,30 @@
1818
<code>,</code> and <code>_</code> (both included), which overlaps with the
1919
range <code>[0-9]</code> and is thus clearly not intended.
2020
</p>
21-
</overview>
21+
</overview>
2222

23-
<recommendation>
24-
<p>
23+
<recommendation>
24+
<p>
2525

26-
Don't write character ranges were there might be confusion as to
26+
Don't write character ranges were there might be confusion as to
2727
which characters are included in the range.
2828

29-
</p>
30-
</recommendation>
29+
</p>
30+
</recommendation>
3131

32-
<example>
32+
<example>
3333

34-
<p>
34+
<p>
3535
The following example code checks whether a string is a valid 6 digit hex color.
36-
</p>
36+
</p>
3737

3838
<sample language="javascript">
3939
function isValidHexColor(color) {
4040
return /^#[0-9a-fA-f]{6}$/i.test(color);
4141
}
4242
</sample>
4343

44-
<p>
44+
<p>
4545
However, the <code>A-f</code> range matches every uppercase character, and
4646
thus a "color" like <code>#XYZ</code> is considered valid.
4747
</p>
@@ -56,11 +56,11 @@ function isValidHexColor(color) {
5656
}
5757
</sample>
5858

59-
</example>
59+
</example>
6060

61-
<references>
62-
<li>Mitre.org: <a href="https://cwe.mitre.org/data/definitions/20.html">CWE-020</a></li>
63-
<li>github.com: <a href="https://github.com/advisories/GHSA-g4rg-993r-mgx7">CVE-2021-42740</a></li>
64-
<li>wh0.github.io: <a href="https://wh0.github.io/2021/10/28/shell-quote-rce-exploiting.html">Exploiting CVE-2021-42740</a></li>
65-
</references>
61+
<references>
62+
<li>Mitre.org: <a href="https://cwe.mitre.org/data/definitions/20.html">CWE-020</a></li>
63+
<li>github.com: <a href="https://github.com/advisories/GHSA-g4rg-993r-mgx7">CVE-2021-42740</a></li>
64+
<li>wh0.github.io: <a href="https://wh0.github.io/2021/10/28/shell-quote-rce-exploiting.html">Exploiting CVE-2021-42740</a></li>
65+
</references>
6666
</qhelp>

python/ql/src/Security/CWE-020/OverlyLargeRange.qhelp

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@
33
"qhelp.dtd">
44
<qhelp>
55

6-
<overview>
7-
<p>
8-
A regexp range can by accident match more than was intended.
6+
<overview>
7+
<p>
8+
A regexp range can by accident match more than was intended.
99
For example, the regular expression <code>/[a-zA-z]/</code> will
1010
match every lowercase and uppercase letters, but the same regular
1111
expression will also match the chars: <code>[\]^_`</code>.
12-
</p>
12+
</p>
1313
<p>
1414
On other occasions it can happen that the dash in a regular
1515
expression is not escaped, which will cause it to be interpreted
@@ -18,30 +18,30 @@
1818
<code>,</code> and <code>_</code> (both included), which overlaps with the
1919
range <code>[0-9]</code> and is thus clearly not intended.
2020
</p>
21-
</overview>
21+
</overview>
2222

23-
<recommendation>
24-
<p>
23+
<recommendation>
24+
<p>
2525

26-
Don't write character ranges were there might be confusion as to
26+
Don't write character ranges were there might be confusion as to
2727
which characters are included in the range.
2828

29-
</p>
30-
</recommendation>
29+
</p>
30+
</recommendation>
3131

32-
<example>
32+
<example>
3333

34-
<p>
34+
<p>
3535
The following example code checks whether a string is a valid 6 digit hex color.
36-
</p>
36+
</p>
3737

3838
<sample language="python">
3939
import re
4040
def is_valid_hex_color(color):
4141
return re.match(r'^#[0-9a-fA-f]{6}$', color) is not None
4242
</sample>
4343

44-
<p>
44+
<p>
4545
However, the <code>A-f</code> range matches every uppercase character, and
4646
thus a "color" like <code>#XYZ</code> is considered valid.
4747
</p>
@@ -56,11 +56,11 @@ def is_valid_hex_color(color):
5656
return re.match(r'^#[0-9a-fA-F]{6}$', color) is not None
5757
</sample>
5858

59-
</example>
59+
</example>
6060

61-
<references>
62-
<li>Mitre.org: <a href="https://cwe.mitre.org/data/definitions/20.html">CWE-020</a></li>
63-
<li>github.com: <a href="https://github.com/advisories/GHSA-g4rg-993r-mgx7">CVE-2021-42740</a></li>
64-
<li>wh0.github.io: <a href="https://wh0.github.io/2021/10/28/shell-quote-rce-exploiting.html">Exploiting CVE-2021-42740</a></li>
65-
</references>
61+
<references>
62+
<li>Mitre.org: <a href="https://cwe.mitre.org/data/definitions/20.html">CWE-020</a></li>
63+
<li>github.com: <a href="https://github.com/advisories/GHSA-g4rg-993r-mgx7">CVE-2021-42740</a></li>
64+
<li>wh0.github.io: <a href="https://wh0.github.io/2021/10/28/shell-quote-rce-exploiting.html">Exploiting CVE-2021-42740</a></li>
65+
</references>
6666
</qhelp>

ruby/ql/src/queries/security/cwe-020/OverlyLargeRange.qhelp

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@
33
"qhelp.dtd">
44
<qhelp>
55

6-
<overview>
7-
<p>
8-
A regexp range can by accident match more than was intended.
6+
<overview>
7+
<p>
8+
A regexp range can by accident match more than was intended.
99
For example, the regular expression <code>/[a-zA-z]/</code> will
1010
match every lowercase and uppercase letters, but the same regular
1111
expression will also match the chars: <code>[\]^_`</code>.
12-
</p>
12+
</p>
1313
<p>
1414
On other occasions it can happen that the dash in a regular
1515
expression is not escaped, which will cause it to be interpreted
@@ -18,30 +18,30 @@
1818
<code>,</code> and <code>_</code> (both included), which overlaps with the
1919
range <code>[0-9]</code> and is thus clearly not intended.
2020
</p>
21-
</overview>
21+
</overview>
2222

23-
<recommendation>
24-
<p>
23+
<recommendation>
24+
<p>
2525

26-
Don't write character ranges were there might be confusion as to
26+
Don't write character ranges were there might be confusion as to
2727
which characters are included in the range.
2828

29-
</p>
30-
</recommendation>
29+
</p>
30+
</recommendation>
3131

32-
<example>
32+
<example>
3333

34-
<p>
34+
<p>
3535
The following example code checks whether a string is a valid 6 digit hex color.
36-
</p>
36+
</p>
3737

3838
<sample language="ruby">
3939
def is_valid_hex_color(color)
4040
/^#[0-9a-fA-f]{6}$/.match(color)
4141
end
4242
</sample>
4343

44-
<p>
44+
<p>
4545
However, the <code>A-f</code> range matches every uppercase character, and
4646
thus a "color" like <code>#XYZ</code> is considered valid.
4747
</p>
@@ -56,11 +56,11 @@ def is_valid_hex_color(color)
5656
end
5757
</sample>
5858

59-
</example>
59+
</example>
6060

61-
<references>
62-
<li>Mitre.org: <a href="https://cwe.mitre.org/data/definitions/20.html">CWE-020</a></li>
63-
<li>github.com: <a href="https://github.com/advisories/GHSA-g4rg-993r-mgx7">CVE-2021-42740</a></li>
64-
<li>wh0.github.io: <a href="https://wh0.github.io/2021/10/28/shell-quote-rce-exploiting.html">Exploiting CVE-2021-42740</a></li>
65-
</references>
61+
<references>
62+
<li>Mitre.org: <a href="https://cwe.mitre.org/data/definitions/20.html">CWE-020</a></li>
63+
<li>github.com: <a href="https://github.com/advisories/GHSA-g4rg-993r-mgx7">CVE-2021-42740</a></li>
64+
<li>wh0.github.io: <a href="https://wh0.github.io/2021/10/28/shell-quote-rce-exploiting.html">Exploiting CVE-2021-42740</a></li>
65+
</references>
6666
</qhelp>

0 commit comments

Comments
 (0)