Skip to content

Commit 7cc7ec9

Browse files
Updated recommendations for avoiding JEXL injections
1 parent c243f2f commit 7cc7ec9

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

java/ql/src/experimental/Security/CWE/CWE-094/JexlInjection.qhelp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,8 @@ and then evaluated, then it may allow the attacker to run arbitrary code.
1414

1515
<recommendation>
1616
<p>
17-
Including untrusted input in a JEXL expression should be avoided. If it is not possible,
18-
JEXL expressions should be run in a sandbox that allows accessing only
17+
It is generally recommended to avoid using untrusted input in a JEXL expression.
18+
If it is not possible, JEXL expressions should be run in a sandbox that allows accessing only
1919
explicitly allowed classes.
2020
</p>
2121
</recommendation>
@@ -60,4 +60,4 @@ that checks if callees are instances of allowed classes.
6060
<a href="https://owasp.org/www-community/vulnerabilities/Expression_Language_Injection">Expression Language Injection</a>.
6161
</li>
6262
</references>
63-
</qhelp>
63+
</qhelp>

0 commit comments

Comments
 (0)