File tree Expand file tree Collapse file tree
javascript/ql/src/Security/CWE-079 Expand file tree Collapse file tree Original file line number Diff line number Diff line change 44<qhelp >
55<overview >
66 <p >
7- Dynamically constructing HTML with inputs from exported functions may
7+ Dynamically constructing HTML with inputs from library functions may
88 inadvertently leave a client open to XSS attacks.
99
1010 Clients using the exported function may use inputs containing unsafe HTML,
2828<example >
2929
3030 <p >
31- The following example shows a library function that shows a boldface name
31+ The following example has a library function that renders a boldface name
3232 by writing to the <code >innerHTML</code > property of an element.
3333 </p >
3434
Original file line number Diff line number Diff line change 11/**
22 * @name Unsafe HTML constructed from library input
33 * @description Using externally controlled strings to construct HTML might allow a malicious
4- * user to perform an cross-site scripting attack.
4+ * user to perform a cross-site scripting attack.
55 * @kind path-problem
66 * @problem.severity error
77 * @precision high
You can’t perform that action at this time.
0 commit comments