You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: swift/ql/src/queries/Security/CWE-022/PathInjection.qhelp
+10-9Lines changed: 10 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -26,28 +26,29 @@ such as <code>..</code>. Such a path could point to any directory on the file sy
26
26
27
27
<example>
28
28
<p>
29
-
In the first example, a file name is read from an HTTP request and then used to access a file.
30
-
However, a malicious response could include a file name that is an absolute path, such as
29
+
The following code shows two bad examples.
30
+
31
+
<samplesrc="PathInjectionBad.swift" />
32
+
33
+
In the first, a file name is read from an HTTP request and then used to access a file. In this case, a malicious response could include a file name that is an absolute path, such as
0 commit comments