Skip to content

Commit 9d2b049

Browse files
committed
Fix qhelp after suggestions
1 parent 6e7c7c2 commit 9d2b049

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

swift/ql/src/queries/Security/CWE-022/PathInjection.qhelp

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,11 @@ such as <code>..</code>. Such a path could point to any directory on the file sy
2727
<example>
2828
<p>
2929
The following code shows two bad examples.
30+
</p>
3031

3132
<sample src="PathInjectionBad.swift" />
3233

34+
<p>
3335
In the first, a file name is read from an HTTP request and then used to access a file. In this case, a malicious response could include a file name that is an absolute path, such as
3436
<code>"/Applications/(current_application)/Documents/sensitive.data"</code>.
3537
</p>
@@ -48,7 +50,6 @@ known prefix. This ensures that regardless of the user input, the resulting path
4850
</p>
4951

5052
<sample src="PathInjectionGood.swift" />
51-
```suggestion
5253
</example>
5354

5455
<references>

0 commit comments

Comments
 (0)