You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: java/ql/src/Security/CWE/CWE-652/XQueryInjection.qhelp
+3-4Lines changed: 3 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -9,20 +9,19 @@ This allows an attacker to control the structure of the query.</p>
9
9
</overview>
10
10
<recommendation>
11
11
12
-
<p>Use parameterized queries. This will help ensure separation between data plane and control plane.</p>
12
+
<p>Use parameterized queries. This will help ensure the program retains control of the query structure.</p>
13
13
14
14
</recommendation>
15
15
<example>
16
16
17
-
<p>This example is a comparison of unused parameterized query and using parameterized query.
18
-
Parameterized query through <code>bindString</code>.</p>
17
+
<p>The following example compares building a query by string concatenation (bad) vs. using <code>bindString</code> to parameterize the query (good).</p>
0 commit comments