Skip to content

Commit 9dfac3a

Browse files
committed
move qhelp samples to an examples folder
1 parent b8dc633 commit 9dfac3a

File tree

5 files changed

+3
-3
lines changed

5 files changed

+3
-3
lines changed

csharp/ql/src/Security Features/CWE-022/TaintedPath.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ enter a filename which contains special characters. For example, the string "../
3434
reading the file located at "/home/[user]/../../etc/passwd", which is the system's password file. This file would then be
3535
sent back to the user, giving them access to all the system's passwords.</p>
3636

37-
<sample src="TaintedPath.cs" />
37+
<sample src="examples/TaintedPath.cs" />
3838

3939
</example>
4040
<references>

csharp/ql/src/Security Features/CWE-022/ZipSlip.qhelp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ the result is within the destination directory. If provided with a zip file cont
5050
path like <code>..\sneaky-file</code>, then this file would be written outside the destination
5151
directory.</p>
5252

53-
<sample src="ZipSlipBad.cs" />
53+
<sample src="examples/ZipSlipBad.cs" />
5454

5555
<p>To fix this vulnerability, we need to make three changes. Firstly, we need to resolve any
5656
directory traversal or other special characters in the path by using <code>Path.GetFullPath</code>.
@@ -59,7 +59,7 @@ Secondly, we need to identify the destination output directory, again using
5959
the resolved output starts with the resolved destination directory, and throw an exception if this
6060
is not the case.</p>
6161

62-
<sample src="ZipSlipGood.cs" />
62+
<sample src="examples/ZipSlipGood.cs" />
6363

6464
</example>
6565
<references>

0 commit comments

Comments
 (0)