Skip to content

Commit 8fd6424

Browse files
erik-kroghasgerf
andcommitted
fix the qhelp
Co-authored-by: Asger F <[email protected]>
1 parent 5e5160d commit 8fd6424

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

javascript/ql/src/Security/CWE-078/SecondOrderCommandInjection.qhelp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ the server.
1515
<recommendation>
1616

1717
<p>
18-
Sanitize user input before passing it to the shell command by for example
19-
ensuring that URLs are valid and do not contain malicious commands.
18+
Sanitize user input before passing it to the shell command. For example,
19+
ensure that URLs are valid and do not contain malicious commands.
2020
</p>
2121

2222
</recommendation>
@@ -30,7 +30,7 @@ URL that can be controlled by a malicious user.
3030
<sample src="examples/second-order-command-injection.js" />
3131

3232
<p>
33-
The problem has been fixed in the below where the URL is validated before
33+
The problem has been fixed in the snippet below, where the URL is validated before
3434
being passed to the shell command.
3535
</p>
3636

0 commit comments

Comments
 (0)