File tree Expand file tree Collapse file tree
java/ql/src/Security/CWE/CWE-020 Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -46,7 +46,7 @@ some existing sanitization.</p>
4646
4747<sample src =" ExternalAPITaintStepExample.java" />
4848
49- <p >If the query reported the call to <code >StringBuilder.append</code > on Line 7, this would suggest that this external API is
49+ <p >If the query reported the call to <code >StringBuilder.append</code > on line 7, this would suggest that this external API is
5050not currently modeled as a taint step in the taint tracking library. The next step would be to model this as taint step, then
5151re-run the query to determine what additional results might be found. In this example, it seems likely that the result of the
5252<code >StringBuilder</code > will be executed as an SQL query, potentially leading to an SQL injection vulnerability.</p >
You can’t perform that action at this time.
0 commit comments