Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 73c8338

Browse files
Use <code> tag in JexlInjection.qhelp
1 parent ee6d28b commit 73c8338

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

java/ql/src/experimental/Security/CWE/CWE-094/JexlInjection.qhelp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,16 +28,16 @@ The following example uses untrusted data to build and run a JEXL expression.
2828

2929
<p>
3030
The next example shows how an untrusted JEXL expression can be run
31-
in a sandbox that allows accessing only methods in the `java.lang.Math` class.
32-
The sandbox is implemented using `JexlSandbox` class that is provided by
31+
in a sandbox that allows accessing only methods in the <code>java.lang.Math</code> class.
32+
The sandbox is implemented using <code>JexlSandbox</code> class that is provided by
3333
Apache Commons JEXL 3.
3434
However, it's recommended to avoid using untrusted input in JEXL expressions.
3535
</p>
3636
<sample src="SaferJexlExpressionEvaluationWithSandbox.java" />
3737

3838
<p>
3939
The next example shows another way how a sandbox can be implemented.
40-
It uses a custom implememtation of `JexlUberspect`
40+
It uses a custom implememtation of <code>JexlUberspect</code>
4141
that checks if callees are instances of allowed classes.
4242
Again, it's recommended to avoid using untrusted input in JEXL expressions.
4343
</p>

0 commit comments

Comments
 (0)