File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed
javascript/ql/src/Security/CWE-020 Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change 77 <p >
88
99 Sanitizing untrusted input with regular expressions is a
10- common technique. However, it is error prone to match untrusted input
10+ common technique. However, it is error- prone to match untrusted input
1111 against regular expressions without anchors such as <code >^</code > or
1212 <code >$</code >. Malicious input can bypass such security checks by
1313 embedding one of the allowed patterns in an unexpected location.
1717 <p >
1818
1919 Even if the matching is not done in a security-critical
20- context, it may still cause undesirable behaviors when the regular
21- expression matches accidentally.
20+ context, it may still cause undesirable behavior when the regular
21+ expression accidentally matches .
2222
2323 </p >
2424 </overview >
You can’t perform that action at this time.
0 commit comments