Skip to content

Conversation

@markshannon
Copy link
Contributor

These two queries are a re-implementation of https://github.com/Semmle/ql/tree/master/javascript/ql/src/Security/CWE-020 for Python.

Copy link
Contributor

@felicitymay felicitymay left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

A couple of small comments on the text, but the qhelp generally looks great.

</p>
<p>
This vulnerability is addressed in the <code>safe</code> check, which
escapes the <code>.</code> and will reject <code>wwwXexample.com</code>.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggest: "The safe check closes this vulnerability by escaping the . so that URLs of the form wwwXexample.com are rejected."

@markshannon markshannon requested a review from a team as a code owner January 25, 2019 16:47
@felicitymay
Copy link
Contributor

Thanks for the text updates. The text LGTM now.

ghost
ghost previously approved these changes Jan 28, 2019
Copy link

@ghost ghost left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.
Thanks for updating the JavaScript qhelp as well.

taus-semmle
taus-semmle previously approved these changes Jan 29, 2019
Copy link
Contributor

@taus-semmle taus-semmle left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. Merging.

@taus-semmle taus-semmle dismissed stale reviews from ghost and themself via 9adb19f January 29, 2019 13:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants