Skip to content

Commit 5698638

Browse files
geoffw0hubwriter
andauthored
Apply suggestions from code review (documentation)
Co-authored-by: hubwriter <[email protected]>
1 parent 6e184f2 commit 5698638

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

cpp/ql/src/Security/CWE/CWE-611/XXE.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
<overview>
55
<p>
66
Parsing untrusted XML files with a weakly configured XML parser may lead to an
7-
XML External Entity (XXE) attack. This type of attack uses external entity references
7+
XML external entity (XXE) attack. This type of attack uses external entity references
88
to access arbitrary files on a system, carry out denial-of-service (DoS) attacks, or server-side
99
request forgery. Even when the result of parsing is not returned to the user, DoS attacks are still possible
1010
and out-of-band data retrieval techniques may allow attackers to steal sensitive data.

cpp/ql/src/Security/CWE/CWE-611/XXE.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* @name External Entity Expansion
2+
* @name XML external entity expansion
33
* @description Parsing user-controlled XML documents and allowing expansion of
44
* external entity references may lead to disclosure of
55
* confidential data or denial of service.
@@ -208,5 +208,5 @@ class XXEConfiguration extends DataFlow::Configuration {
208208
from XXEConfiguration conf, DataFlow::PathNode source, DataFlow::PathNode sink
209209
where conf.hasFlowPath(source, sink)
210210
select sink, source, sink,
211-
"This $@ is not configured to prevent an External Entity Expansion (XXE) attack.", source,
211+
"This $@ is not configured to prevent an XML external entity (XXE) attack.", source,
212212
"XML parser"

0 commit comments

Comments
 (0)