File tree Expand file tree Collapse file tree 1 file changed +3
-4
lines changed
javascript/ql/src/experimental/Security/CWE-94 Expand file tree Collapse file tree 1 file changed +3
-4
lines changed Original file line number Diff line number Diff line change @@ -36,10 +36,9 @@ curl -i -s -k -X $'POST' -H $'Host: 127.0.0.1:5061' -H $'Connection: close' -H $
36
36
37
37
<example >
38
38
<p >
39
- As the example of safe usage of rendering engine, please see example below.
40
- In opposite to first example, instead of concatenation of provided user input with the template
41
- it is possible to provide user input as a context - user input will be safely insterted
42
- and rendered inside correspondent placeholders.
39
+ The example below provides an example of how to use a template engine without any risk of Server-Side Template Injection.
40
+ Instead of concatenating user input onto the template, the template uses a placeholder and safely inserts
41
+ the user input.
43
42
</p >
44
43
45
44
<sample src =" examples/ServerSideTemplateInjectionSafe.js" />
You can’t perform that action at this time.
0 commit comments