Skip to content

Commit 6e16ed5

Browse files
Reveiw suggestions: Spelling/grammar fixes
Co-authored-by: Taus <[email protected]>
1 parent 0f0c1e1 commit 6e16ed5

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

python/ql/src/Security/CWE-074/TemplateInjection.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@
1818
<p>The following is an example of a string that could be used to cause remote code execution when interpreted as a template:</p>
1919
<sample src="examples/template_exploit.txt" />
2020

21-
<p>In the following case, user input is not used to construct the template; rather is only used for as the parameters to render the template, which is safe.</p>
21+
<p>In the following case, user input is not used to construct the template; rather it is only used as the parameters to render the template, which is safe.</p>
2222
<sample src="examples/JinjaGoodParam.py" />
2323

2424
<p>In the following case, a <code>SandboxedEnvironment</code> is used, preventing remote code execution.</p>

python/ql/src/Security/CWE-074/TemplateInjection.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,5 +16,5 @@ import TemplateInjectionFlow::PathGraph
1616

1717
from TemplateInjectionFlow::PathNode source, TemplateInjectionFlow::PathNode sink
1818
where TemplateInjectionFlow::flowPath(source, sink)
19-
select sink.getNode(), source, sink, "This Template construction depends on $@.", source.getNode(),
19+
select sink.getNode(), source, sink, "This template construction depends on a $@.", source.getNode(),
2020
"user-provided value"
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
---
22
category: newQuery
33
---
4-
* The Server Side Template Injection query (`py/template-injection`), originally contributed to the experimental query pack by @porcupineyhairs, has been promoted to the ain query suite. This query finds instances of templates for a template engine such as Jinja being constructed with user input.
4+
* The Server Side Template Injection query (`py/template-injection`), originally contributed to the experimental query pack by @porcupineyhairs, has been promoted to the main query suite. This query finds instances of templates for a template engine such as Jinja being constructed with user input.

0 commit comments

Comments
 (0)