Skip to content

Commit 40e24b6

Browse files
am0o0hmac
authored andcommitted
v4.1 fix file names in qhelp
1 parent 335441c commit 40e24b6

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

ruby/ql/src/experimental/cwe-502/PlistUnsafeDeserialization.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
<example>
1515
<p>In the example below, you can see safe and unsafe Plist dangerous method calls that can be abused by a remote user input. You can use "marshal: false" as an arugument for <code>Plist.parse_xml</code> to use it safe.
1616
</p>
17-
<sample src="PlistUnsafeYamlDeserialization.rb" />
17+
<sample src="PlistUnsafeDeserialization.rb" />
1818
</example>
1919
<references>
2020
<li>

ruby/ql/src/experimental/cwe-502/YAMLUnsafeDeserialization.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@
1515
</recommendation>
1616
<example>
1717
<p>In the example below, you can see safe and unsafe methods get called by a remote user input. You can give correct authorization to users, or you can use safe methods for loading yaml documents.</p>
18-
<sample src="YAMLUnsafeYamlDeserialization.rb" />
18+
<sample src="YAMLUnsafeDeserialization.rb" />
1919
</example>
2020
<references>
2121
<li>

ruby/ql/src/queries/security/cwe-502/UnsafeDeserialization.qhelp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,11 +40,11 @@ to arbitrary objects, this is inherently unsafe.
4040
<sample src="examples/UnsafeDeserializationBad.rb"/>
4141

4242
<p>In the example below, you can see safe and unsafe methods get called by a remote user input. You can give correct authorization to users, or you can use safe methods for loading yaml documents.</p>
43-
<sample src="examples/YAMLUnsafeYamlDeserialization.rb"/>
43+
<sample src="examples/YAMLUnsafeDeserialization.rb"/>
4444

4545
<p>In the example below, you can see safe and unsafe Plist dangerous method calls that can be abused by a remote user input. You can use "marshal: false" as an arugument for <code>Plist.parse_xml</code> to use it safe.
4646
</p>
47-
<sample src="examples/PlistUnsafeYamlDeserialization.rb"/>
47+
<sample src="examples/PlistUnsafeDeserialization.rb"/>
4848

4949
<p>
5050
Using <code>JSON.parse</code> and <code>YAML.safe_load</code> instead, as in the

0 commit comments

Comments
 (0)