Skip to content

Commit cbb031e

Browse files
Update ruby/ql/src/queries/security/cwe-094/TemplateInjection.qhelp
Co-authored-by: intrigus-lgtm <[email protected]>
1 parent 44997d6 commit cbb031e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

ruby/ql/src/queries/security/cwe-094/TemplateInjection.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ use a sandboxed environment where access to unsafe attributes and methods is pro
1717

1818
<example>
1919
<p>
20-
<p>Consider the example given below, an untrusted HTTP parameter `name` is used to generate a template string. This can lead to remote code execution. </p>
20+
<p>Consider the example given below, an untrusted HTTP parameter <code>name</code> is used to generate a template string. This can lead to remote code execution. </p>
2121
<sample src="examples/SSTIBad.rb" />
2222

2323
<p>Here we have fixed the problem by including ERB/Slim syntax in the string, then the user input will be rendered but no evaluated.</p>

0 commit comments

Comments
 (0)