File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed
python/ql/src/experimental/Security/CWE-943 Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change 20
20
NoSQL injections can be prevented by escaping user-input's special characters that are passed into the NoSQL query from the user-supplied source.
21
21
Alternatively, using a sanitize library such as MongoSanitizer will ensure that user-supplied sources can not act as a malicious query.
22
22
</p >
23
- <recommendation >
23
+ </ recommendation >
24
24
25
25
<example >
26
26
<p >In the example below, the user-supplied source is passed to a MongoDB function that queries the MongoDB database.</p >
27
27
<sample src =" examples/NoSQLInjection-bad.py" />
28
28
<p > This can be fixed by using a sanitizer library like MongoSanitizer as shown in this annotated code version below.</p >
29
29
<sample src =" examples/NoSQLInjection-good.py" />
30
- <example >
30
+ </ example >
31
31
32
32
<references >
33
33
<li >Mongoengine: <a href =" http://mongoengine.org/" >Documentation</a >.</li >
You can’t perform that action at this time.
0 commit comments