Skip to content

Commit 345c383

Browse files
committed
Fix new Android queries' IDs
1 parent 690dd47 commit 345c383

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

java/ql/src/Security/CWE/CWE-079/AndroidWebViewAddJavascriptInterface.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/**
22
* @name Access Java object methods through JavaScript exposure
3-
* @id java/android-webview-addjavascriptinterface
3+
* @id java/android/webview-addjavascriptinterface
44
* @description Exposing a Java object in a WebView with a JavaScript interface can lead to malicious JavaScript controlling the application.
55
* @kind problem
66
* @problem.severity warning

java/ql/src/Security/CWE/CWE-079/AndroidWebViewSettingsEnabledJavaScript.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
* @name Android WebView JavaScript settings
33
* @description Enabling JavaScript execution in a WebView can result in cross-site scripting attacks.
44
* @kind problem
5-
* @id java/android-websettings-javascript-enabled
5+
* @id java/android/websettings-javascript-enabled
66
* @problem.severity warning
77
* @security-severity 6.1
88
* @precision medium

java/ql/src/Security/CWE/CWE-200/AndroidWebViewSettingsFileAccess.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
* @name Android WebSettings file access
33
* @kind problem
44
* @description Enabling access to the file system in a WebView allows attackers to view sensitive information.
5-
* @id java/android-websettings-file-access
5+
* @id java/android/websettings-file-access
66
* @problem.severity warning
77
* @security-severity 6.5
88
* @precision medium

0 commit comments

Comments
 (0)