Skip to content

Commit 3815a5a

Browse files
committed
fix qhelp syntax
1 parent a6571a0 commit 3815a5a

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

ruby/ql/src/queries/security/cwe-094/UnsafeCodeConstruction.qhelp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ and methods.
8080
A safer approach is to use <code>class_variable_set</code> and
8181
<code>class_variable_get</code> along with <code>define_method</code>. String
8282
interpolation is still used to construct the class variable name, but this is
83-
safe because <code>class_variable_set<code> is not susceptible to code injection.
83+
safe because <code>class_variable_set</code> is not susceptible to code injection.
8484
To construct a dynamic method call we use <code>send</code>, which is ulnerable
8585
to code injection: if an attacker can control the first argument, they can call
8686
any method on the receiver. However this is less powerful than being able to run
@@ -101,10 +101,10 @@ OWASP:
101101
Wikipedia: <a href="https://en.wikipedia.org/wiki/Code_injection">Code Injection</a>.
102102
</li>
103103
<li>
104-
Ruby documentation: <a href="https://docs.ruby-lang.org/en/3.2/Module.html#method-i-define_method"><code>define_method</code></a>.
104+
Ruby documentation: <a href="https://docs.ruby-lang.org/en/3.2/Module.html#method-i-define_method">define_method</a>.
105105
</li>
106106
<li>
107-
Ruby documentation: <a href="https://docs.ruby-lang.org/en/3.2/Module.html#method-i-class_variable_set"><code>class_variable_set</code></a>.
107+
Ruby documentation: <a href="https://docs.ruby-lang.org/en/3.2/Module.html#method-i-class_variable_set">class_variable_set</a>.
108108
</li>
109109
</references>
110110
</qhelp>

0 commit comments

Comments
 (0)