Skip to content

Commit 6e1846b

Browse files
author
Esben Sparre Andreasen
committed
JS: address doc review comments
1 parent 89887e7 commit 6e1846b

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

javascript/ql/src/Security/CWE-918/RequestForgery.qhelp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,9 +40,9 @@
4040

4141
The following example shows an HTTP request parameter
4242
being used directly in a URL request without validating the input,
43-
which facilitate an SSRF attack. The request
44-
<code>http.get(...)</code> is vulnerable since an attacker can choose
45-
the value of <code>target</code> to be anything he wants. For
43+
which facilitates an SSRF attack. The request
44+
<code>http.get(...)</code> is vulnerable since attackers can choose
45+
the value of <code>target</code> to be anything they want. For
4646
instance, the attacker can choose
4747
<code>"internal.example.com/#"</code> as the target, causing the URL
4848
used in the request to be

0 commit comments

Comments
 (0)