Skip to content

Commit 10a3dcb

Browse files
authored
Update GroovyInjection.qhelp
1 parent 0f19960 commit 10a3dcb

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

java/ql/src/Security/CWE/CWE-094/GroovyInjection.qhelp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,9 @@ This is typically done when using Groovy for its scripting or domain specific la
2828
The fundamental problem is that Groovy is a dynamic language, yet <code>SecureASTCustomizer</code> works by looking at Groovy AST statically.
2929

3030
This makes it very easy for an attacker to bypass many of the intended checks
31-
(see https://kohsuke.org/2012/04/27/groovy-secureastcustomizer-is-harmful/).
31+
(see [Groovy SecureASTCustomizer is harmful](https://kohsuke.org/2012/04/27/groovy-secureastcustomizer-is-harmful/)).
3232
Therefore, besides <code>SecureASTCustomizer</code>, runtime checks are also necessary before calling Groovy methods
33-
(see https://melix.github.io/blog/2015/03/sandboxing.html).
33+
(see [Improved sandboxing of Groovy scripts](https://melix.github.io/blog/2015/03/sandboxing.html)).
3434

3535
It is also possible to use a block-list method, excluding unwanted classes from being loaded by the JVM.
3636
This method is not always recommended, because block-lists can be bypassed by unexpected values.

0 commit comments

Comments
 (0)