Skip to content

Commit ba69e19

Browse files
committed
JS: Address doc review
1 parent 682f279 commit ba69e19

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

javascript/ql/src/Security/CWE-400/PrototypePollution.qhelp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
<overview>
77
<p>
88
Most JavaScript objects inherit the properties of the built-in <code>Object.prototype</code> object.
9-
Prototype pollution is a type of vulnerability in which an attacker is be able to modify <code>Object.prototype</code>.
9+
Prototype pollution is a type of vulnerability in which an attacker is able to modify <code>Object.prototype</code>.
1010
Since most objects inherit from the compromised <code>Object.prototype</code>, the attacker can use this
1111
to tamper with the application logic, and often escalate to remote code execution or cross-site scripting.
1212
</p>
@@ -24,7 +24,7 @@
2424
<recommendation>
2525
<p>
2626
Update your library dependencies in order to use a safe version of the <em>merge</em> or <em>extend</em> function.
27-
If you library has no fixed version, switch to another library.
27+
If your library has no fixed version, switch to another library.
2828
</p>
2929
</recommendation>
3030

@@ -71,7 +71,7 @@
7171
<a href="https://hackerone.com/reports/454365">jQuery</a>,
7272
<a href="https://hackerone.com/reports/381185">extend</a>,
7373
<a href="https://hackerone.com/reports/430291">just-extend</a>,
74-
<a href="https://hackerone.com/reports/381194">merge.recursive</a>,
74+
<a href="https://hackerone.com/reports/381194">merge.recursive</a>.
7575
</li>
7676
<li>Express:
7777
<a href="https://expressjs.com/en/api.html#express.urlencoded">urlencoded()</a>

javascript/ql/src/Security/CWE-400/PrototypePollution.ql

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
/**
2-
* @name Prototype Pollution
2+
* @name Prototype pollution
33
* @description Recursively merging a user-controlled object into another object
44
* can allow an attacker to modify the built-in Object prototype.
55
* @kind path-problem

0 commit comments

Comments
 (0)