Skip to content

Commit 8f6d2ed

Browse files
committed
Adjust ZipSlip query description according to review suggestions.
1 parent 3c4d938 commit 8f6d2ed

File tree

6 files changed

+12
-12
lines changed

6 files changed

+12
-12
lines changed

csharp/ql/src/Security Features/CWE-022/ZipSlip.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
/**
22
* @name Arbitrary file access during archive extraction ("Zip Slip")
3-
* @description Accessing filesystem paths built from the name of an archive entry without
3+
* @description Extracting files from a malicious ZIP file, or similar type of archive, without
44
* validating that the destination file path is within the destination directory
5-
* can allow an attacker to access unexpected resources.
5+
* can allow an attacker to unexpectedly gain access to resources.
66
* @kind path-problem
77
* @id cs/zipslip
88
* @problem.severity error

go/ql/src/Security/CWE-022/ZipSlip.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
/**
22
* @name Arbitrary file access during archive extraction ("Zip Slip")
3-
* @description Accessing filesystem paths built from the name of an archive entry without
3+
* @description Extracting files from a malicious ZIP file, or similar type of archive, without
44
* validating that the destination file path is within the destination directory
5-
* can allow an attacker to access unexpected resources.
5+
* can allow an attacker to unexpectedly gain access to resources.
66
* @kind path-problem
77
* @id go/zipslip
88
* @problem.severity error

java/ql/src/Security/CWE/CWE-022/ZipSlip.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
/**
22
* @name Arbitrary file access during archive extraction ("Zip Slip")
3-
* @description Accessing filesystem paths built from the name of an archive entry without
3+
* @description Extracting files from a malicious ZIP file, or similar type of archive, without
44
* validating that the destination file path is within the destination directory
5-
* can allow an attacker to access unexpected resources.
5+
* can allow an attacker to unexpectedly gain access to resources.
66
* @kind path-problem
77
* @id java/zipslip
88
* @problem.severity error

javascript/ql/src/Security/CWE-022/ZipSlip.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
/**
22
* @name Arbitrary file access during archive extraction ("Zip Slip")
3-
* @description Accessing filesystem paths built from the name of an archive entry without
3+
* @description Extracting files from a malicious ZIP file, or similar type of archive, without
44
* validating that the destination file path is within the destination directory
5-
* can allow an attacker to access unexpected resources.
5+
* can allow an attacker to unexpectedly gain access to resources.
66
* @kind path-problem
77
* @id js/zipslip
88
* @problem.severity error

python/ql/src/experimental/Security/CWE-022/ZipSlip.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
/**
22
* @name Arbitrary file access during archive extraction ("Zip Slip")
3-
* @description Accessing filesystem paths built from the name of an archive entry without
3+
* @description Extracting files from a malicious ZIP file, or similar type of archive, without
44
* validating that the destination file path is within the destination directory
5-
* can allow an attacker to access unexpected resources.
5+
* can allow an attacker to unexpectedly gain access to resources.
66
* @kind path-problem
77
* @id py/zipslip
88
* @problem.severity error

ruby/ql/src/experimental/cwe-022-zipslip/ZipSlip.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
/**
22
* @name Arbitrary file access during archive extraction ("Zip Slip")
3-
* @description Accessing filesystem paths built from the name of an archive entry without
3+
* @description Extracting files from a malicious ZIP file, or similar type of archive, without
44
* validating that the destination file path is within the destination directory
5-
* can allow an attacker to access unexpected resources.
5+
* can allow an attacker to unexpectedly gain access to resources.
66
* @kind path-problem
77
* @id rb/zip-slip
88
* @problem.severity error

0 commit comments

Comments
 (0)