Skip to content

Commit 39b5ebf

Browse files
committed
Fix qhelp
1 parent 76ea255 commit 39b5ebf

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

java/ql/src/Security/CWE/CWE-441/UnsafeContentUriResolution.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,12 @@
2828
</p>
2929
</recommendation>
3030
<example>
31+
<p>
3132
This example shows two ways of opening a file using a <code>ContentResolver</code>. In the first case, externally-provided
3233
data coming from an intent is directly used in the file-reading operation, allowing an attacker to provide a URI
3334
of the form <code>/data/data/(vulnerable app package)/(private file)</code> to trick the application into reading it and
3435
copying it to the external storage. In the second case, the URI is validated before being used, making sure it does not reference
3536
any internal application files.
36-
<p>
3737
</p>
3838
<sample src="UnsafeContentUriResolution.java" />
3939
</example>

0 commit comments

Comments
 (0)