We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
items
1 parent 9dede31 commit 7a338c4Copy full SHA for 7a338c4
javascript/ql/src/Security/CWE-915/PrototypePollutingAssignment.inc.qhelp
@@ -35,8 +35,8 @@
35
<p>
36
In the example below, the untrusted value <code>req.params.id</code> is used as the property name
37
<code>req.session.todos[id]</code>. If a malicious user passes in the ID value <code>__proto__</code>,
38
- the variable <code>todo</code> will then refer to <code>Object.prototype</code>.
39
- Finally, the modification of <code>todo</code> then allows the attacker to inject arbitrary properties
+ the variable <code>items</code> will then refer to <code>Object.prototype</code>.
+ Finally, the modification of <code>items</code> then allows the attacker to inject arbitrary properties
40
onto <code>Object.prototype</code>.
41
</p>
42
0 commit comments