Skip to content

Commit 3520fed

Browse files
mchammer01atorralba
authored andcommitted
Update SpelInjection.qhelp
1 parent d10dbbd commit 3520fed

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

java/ql/src/Security/CWE/CWE-094/SpelInjection.qhelp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
<overview>
55
<p>
66
The Spring Expression Language (SpEL) is a powerful expression language
7-
provided by Spring Framework. The language offers many features
7+
provided by the Spring Framework. The language offers many features
88
including invocation of methods available in the JVM.
99
If a SpEL expression is built using attacker-controlled data,
1010
and then evaluated in a powerful context,
@@ -31,7 +31,7 @@ that doesn't allow arbitrary method invocation.
3131
<example>
3232
<p>
3333
The following example uses untrusted data to build a SpEL expression
34-
and then runs it in the default powerfull context.
34+
and then runs it in the default powerful context.
3535
</p>
3636
<sample src="UnsafeSpelExpressionEvaluation.java" />
3737

@@ -53,4 +53,4 @@ However, it's recommended to avoid using untrusted input in SpEL expressions.
5353
<a href="https://owasp.org/www-community/vulnerabilities/Expression_Language_Injection">Expression Language Injection</a>.
5454
</li>
5555
</references>
56-
</qhelp>
56+
</qhelp>

0 commit comments

Comments
 (0)