We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 89887e7 commit 6e1846bCopy full SHA for 6e1846b
javascript/ql/src/Security/CWE-918/RequestForgery.qhelp
@@ -40,9 +40,9 @@
40
41
The following example shows an HTTP request parameter
42
being used directly in a URL request without validating the input,
43
- which facilitate an SSRF attack. The request
44
- <code>http.get(...)</code> is vulnerable since an attacker can choose
45
- the value of <code>target</code> to be anything he wants. For
+ which facilitates an SSRF attack. The request
+ <code>http.get(...)</code> is vulnerable since attackers can choose
+ the value of <code>target</code> to be anything they want. For
46
instance, the attacker can choose
47
<code>"internal.example.com/#"</code> as the target, causing the URL
48
used in the request to be
0 commit comments