Skip to content

Commit e861336

Browse files
committed
Java SSRF query: copyedit qhelp
1 parent 3333e7d commit e861336

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

java/ql/src/Security/CWE/CWE-918/RequestForgery.qhelp

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,22 +5,22 @@
55

66

77
<overview>
8-
<p>Directly incorporating user input into a HTTP request without validating the input
8+
<p>Directly incorporating user input into an HTTP request without validating the input
99
can facilitate Server Side Request Forgery (SSRF) attacks. In these attacks, the server
10-
may be tricked into making a request and interacting with an attacker-controlled server.
10+
may be tricked into making a request and interacting with an attacker-controlled server.
1111
</p>
1212

1313
</overview>
1414
<recommendation>
1515

1616
<p>To guard against SSRF attacks, it is advisable to avoid putting user input
17-
directly into the request URL. Instead, maintain a list of authorized
17+
directly into a request URL. Instead, maintain a list of authorized
1818
URLs on the server; then choose from that list based on the user input provided.</p>
1919

2020
</recommendation>
2121
<example>
2222

23-
<p>The following example shows an HTTP request parameter being used directly in a forming a
23+
<p>The following example shows an HTTP request parameter being used directly to form a
2424
new request without validating the input, which facilitates SSRF attacks.
2525
It also shows how to remedy the problem by validating the user input against a known fixed string.
2626
</p>

0 commit comments

Comments
 (0)