You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: java/ql/src/experimental/Security/CWE/CWE-552/UnsafeUrlForward.qhelp
+1-2Lines changed: 1 addition & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -17,8 +17,7 @@
17
17
<example>
18
18
19
19
<p>The following examples show the bad case and the good case respectively.
20
-
In <code>bad1</code> method and <code>bad2</code> method and <code>bad3</code> method and
21
-
<code>bad4</code> method and <code>bad5</code> method and <code>bad6</code> method, shows an HTTP request parameter being used directly in a URL forward
20
+
The <code>bad</code> methods show an HTTP request parameter being used directly in a URL forward
22
21
without validating the input, which may cause file leakage. In <code>good1</code> method,
23
22
ordinary forwarding requests are shown, which will not cause file leakage.
0 commit comments