Skip to content

Commit c03ba2c

Browse files
authored
fix docs references
1 parent 652c7ff commit c03ba2c

File tree

1 file changed

+10
-6
lines changed

1 file changed

+10
-6
lines changed

ruby/ql/src/queries/security/cwe-022/ZipSlip.qhelp

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -43,13 +43,13 @@ instance, if it were created by something like <code>tar -cf archive.tar
4343
outside the destination directory.
4444
</p>
4545

46-
<sample src="examples/zip_slip_bad.py" />
46+
<sample src="examples/zip_slip_bad.rb" />
4747

4848
<p>To fix this vulnerability, we need to check that the path does not
4949
contain any <code>".."</code> elements in it.
5050
</p>
5151

52-
<sample src="examples/zip_slip_good.py" />
52+
<sample src="examples/zip_slip_good.rb" />
5353

5454
</example>
5555
<references>
@@ -63,12 +63,16 @@ OWASP:
6363
<a href="https://owasp.org/www-community/attacks/Path_Traversal">Path Traversal</a>.
6464
</li>
6565
<li>
66-
Python Library Reference:
67-
<a href="https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extract">TarFile.extract</a>.
66+
class
67+
<a href="https://docs.ruby-lang.org/en/2.4.0/Gem/Package/TarReader.html">Gem::Package::TarReader</a>.
6868
</li>
6969
<li>
70-
Python Library Reference:
71-
<a href="https://docs.python.org/3/library/tarfile.html#tarfile.TarFile.extractall">TarFile.extractall</a>.
70+
class
71+
<a href="https://ruby-doc.org/stdlib-2.4.0/libdoc/zlib/rdoc/Zlib/GzipReader.html">Zlib::GzipReader</a>.
72+
</li>
73+
<li>
74+
class
75+
<a href="https://www.rubydoc.info/github/rubyzip/rubyzip/Zip/File">Zip::File</a>.
7276
</li>
7377

7478
</references>

0 commit comments

Comments
 (0)