Skip to content

Commit 0dfb869

Browse files
Apply suggestions from code review
Co-authored-by: Chris Smowton <[email protected]>
1 parent 14e724b commit 0dfb869

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

java/ql/src/experimental/Security/CWE/CWE-502/UnsafeSpringExporterQuery.inc.qhelp

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,10 @@ it results in remote code execution in the worst case.
1414
</p>
1515

1616
<p>
17-
Here are examples of unsafe exporters: <code>HttpInvokerServiceExporter</code>,
17+
Examples of unsafe exporters include: <code>HttpInvokerServiceExporter</code>,
1818
<code>SimpleHttpInvokerServiceExporter</code>, <code>RmiServiceExporter</code>,
1919
<code>HessianServiceExporter</code>.
2020
</p>
21-
2221
<p>
2322
CVE-2016-1000027 has been assigned to this issue in the Spring Framework.
2423
It is regarded as a design limitation, and can be mitigated but not fixed outright.
@@ -34,4 +33,4 @@ consider using global deserialization filters introduced in JEP 290.
3433
</p>
3534
</recommendation>
3635

37-
</qhelp>
36+
</qhelp>

0 commit comments

Comments
 (0)