Skip to content

Commit 88b7a9f

Browse files
Jami CogswellJami Cogswell
authored andcommitted
Java: update qhelp link
1 parent b07c788 commit 88b7a9f

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

java/ql/src/Security/CWE/CWE-352/SpringCSRFProtection.qhelp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
<p>When you set up a web server to receive a request from a client without any mechanism
66
for verifying that it was intentionally sent, then it is vulnerable to attack. An attacker can
77
trick a client into making an unintended request to the web server that will be treated as
8-
an authentic request. This can be done via a URL, image load, XMLHttpRequest, etc. and can
8+
an authentic request. This can be done via a URL, image load, XMLHttpRequest, etc. and can
99
result in exposure of data or unintended code execution.</p>
1010
</overview>
1111

@@ -30,9 +30,9 @@ OWASP:
3030
</li>
3131
<li>
3232
Spring Security Reference:
33-
<a href="https://docs.spring.io/spring-security/site/docs/current/reference/html5/#servlet-csrf">
33+
<a href="https://docs.spring.io/spring-security/reference/servlet/exploits/csrf.html#servlet-csrf">
3434
Cross Site Request Forgery (CSRF) for Servlet Environments
3535
</a>.
3636
</li>
3737
</references>
38-
</qhelp>
38+
</qhelp>

0 commit comments

Comments
 (0)