File tree Expand file tree Collapse file tree 1 file changed +1
-1
lines changed
java/ql/src/Security/CWE/CWE-020 Expand file tree Collapse file tree 1 file changed +1
-1
lines changed Original file line number Diff line number Diff line change @@ -46,7 +46,7 @@ some existing sanitization.</p>
46
46
47
47
<sample src =" ExternalAPITaintStepExample.java" />
48
48
49
- <p >If the query reported the call to <code >StringBuilder.append</code > on Line 7, this would suggest that this external API is
49
+ <p >If the query reported the call to <code >StringBuilder.append</code > on line 7, this would suggest that this external API is
50
50
not currently modeled as a taint step in the taint tracking library. The next step would be to model this as taint step, then
51
51
re-run the query to determine what additional results might be found. In this example, it seems likely that the result of the
52
52
<code >StringBuilder</code > will be executed as an SQL query, potentially leading to an SQL injection vulnerability.</p >
You can’t perform that action at this time.
0 commit comments