We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 132a187 commit ed13c17Copy full SHA for ed13c17
java/ql/src/Security/CWE/CWE-917/OgnlInjection.qhelp
@@ -11,7 +11,7 @@ attacker to modify Java objects' properties or execute arbitrary code.</p>
11
12
<recommendation>
13
<p>The general recommendation is to not evaluate untrusted ONGL expressions. If user provided OGNL
14
-expressions must be evaluated, do this in sandbox (add `-Dognl.security.manager` to JVM arguments)
+expressions must be evaluated, do this in sandbox (add <code>-Dognl.security.manager</code> to JVM arguments)
15
and validate the expressions before evaluation.</p>
16
</recommendation>
17
0 commit comments