Apply suggestions from code review

Co-authored-by: Asger F <asgerf@github.com>
This commit is contained in:
Erik Krogh Kristensen 2021-03-15 12:39:56 +01:00 коммит произвёл GitHub
Родитель c95a8e6776
Коммит b039267b76
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23
2 изменённых файлов: 4 добавлений и 4 удалений

Просмотреть файл

@ -1,2 +1,2 @@
lgtm,codescanning
* The `js/template-object-injection` query has been added. It highlights servers where an templating engine may allow attacks on the server.
* The `js/template-object-injection` query has been added. It highlights places where an attacker can pass special parameters to a template engine.

Просмотреть файл

@ -11,14 +11,14 @@ local file reads or even remote code execution.
<recommendation>
<p>
Avoid using user-controlled objects as arguments to template engine, instead construct the object explicitly with
Avoid using user-controlled objects as arguments to a template engine. Instead, construct the object explicitly with
the specific properties needed by the template.
</p>
</recommendation>
<example>
<p>
In the below example a server uses the user-controlled <code>profile</code> object to
In the example below a server uses the user-controlled <code>profile</code> object to
render the <code>index</code> template.
</p>
<sample src="examples/TemplateObjectInjection.js" />
@ -42,4 +42,4 @@ cwe.mitre.org: <a href="https://cwe.mitre.org/data/definitions/73.html">CWE-73:
</li>
</references>
</qhelp>
</qhelp>