Skip to content

Commit 3cb2ec4

Browse files
committed
fix nits from doc review
1 parent 9aeba4f commit 3cb2ec4

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

javascript/ql/src/Security/CWE-089/SqlInjection.inc.qhelp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ an HTTP request handler in a web application, whose parameter
3838
</p>
3939

4040
<p>
41-
The handler constructs constructs an SQL query string from user input
41+
The handler constructs an SQL query string from user input
4242
and executes it as a database query using the <code>pg</code> library.
4343
The user input may contain quote characters, so this code is vulnerable
4444
to a SQL injection attack.
@@ -65,7 +65,7 @@ escape the user input before embedding it into the query string:
6565

6666
<example>
6767
<p>
68-
In the following example an express handler attempts to delete
68+
In the following example, an express handler attempts to delete
6969
a single document from a MongoDB collection. The document to be
7070
deleted is identified by its <code>_id</code> field, which is
7171
constructed from user input. The user input may contain a query
@@ -75,7 +75,7 @@ object, so this code is vulnerable to a NoSQL injection attack.
7575
<sample src="examples/NoSqlInjection.js" />
7676

7777
<p>
78-
To fix this vulnerability we can use the <code>$eq</code> operator
78+
To fix this vulnerability, we can use the <code>$eq</code> operator
7979
to ensure that the user input is interpreted as a literal value
8080
and not as a query object:
8181
</p>

0 commit comments

Comments
 (0)