Skip to content

Commit 891b975

Browse files
Use correct file names in SpringExporterUnsafeDeserialization.qhelp
1 parent bda2237 commit 891b975

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

java/ql/src/experimental/Security/CWE/CWE-502/SpringExporterUnsafeDeserialization.qhelp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,11 @@ consider using global deserialization filters introduced in JEP 290.
4545
The following example shows how a vulnerable HTTP endpoint can be defined
4646
using <code>HttpInvokerServiceExporter</code> and Spring annotations:
4747
</p>
48-
<sample src="UnsafeHttpInvokerEndpoint.java" />
48+
<sample src="SpringExporterUnsafeDeserialization.java" />
4949
<p>
5050
The next examples shows how the same vulnerable endpoint can be defined in a Spring XML config:
5151
</p>
52-
<sample src="UnsafeHttpInvokerEndpoint.xml" />
52+
<sample src="SpringExporterUnsafeDeserialization.xml" />
5353
</example>
5454

5555
<references>

0 commit comments

Comments
 (0)