File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed
ql/src/queries/security/cwe-078 Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change 4
4
<qhelp >
5
5
<overview >
6
6
<p >Code that passes user input directly to
7
- <code >Kernel# system</code >, <code >Kernel# exec</code >, or some other library
7
+ <code >Kernel. system</code >, <code >Kernel. exec</code >, or some other library
8
8
routine that executes a command, allows the user to execute malicious
9
9
code.</p >
10
10
@@ -24,7 +24,7 @@ safe before using it.</p>
24
24
<example >
25
25
26
26
<p >The following example shows code that takes a shell script that can be changed
27
- maliciously by a user, and passes it straight to <code >Kernel# system</code >
27
+ maliciously by a user, and passes it straight to <code >Kernel. system</code >
28
28
without examining it first.</p >
29
29
30
30
<sample src =" examples/command_injection.rb" />
You can’t perform that action at this time.
0 commit comments