File tree Expand file tree Collapse file tree
java/ql/src/experimental/Security/CWE/CWE-094 Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -28,16 +28,16 @@ The following example uses untrusted data to build and run a JEXL expression.
2828
2929<p >
3030The next example shows how an untrusted JEXL expression can be run
31- in a sandbox that allows accessing only methods in the ` java.lang.Math` class.
32- The sandbox is implemented using ` JexlSandbox` class that is provided by
31+ in a sandbox that allows accessing only methods in the < code > java.lang.Math</ code > class.
32+ The sandbox is implemented using < code > JexlSandbox</ code > class that is provided by
3333Apache Commons JEXL 3.
3434However, it's recommended to avoid using untrusted input in JEXL expressions.
3535</p >
3636<sample src =" SaferJexlExpressionEvaluationWithSandbox.java" />
3737
3838<p >
3939The next example shows another way how a sandbox can be implemented.
40- It uses a custom implememtation of ` JexlUberspect`
40+ It uses a custom implememtation of < code > JexlUberspect</ code >
4141that checks if callees are instances of allowed classes.
4242Again, it's recommended to avoid using untrusted input in JEXL expressions.
4343</p >
You can’t perform that action at this time.
0 commit comments