We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 05a59d2 commit 73e3fadCopy full SHA for 73e3fad
java/ql/src/Security/CWE/CWE-022/TaintedPath.qhelp
@@ -18,6 +18,7 @@ unexpected special characters such as "..". Such a path could point anywhere on
18
<p>Common validation methods include checking that the normalized path is relative and does not contain
19
any ".." components, or checking that the path is contained within a safe folder. The method you should use depends
20
on how the path is used in the application, and whether the path should be a single path component.
21
+</p>
22
23
<p>If the path should be a single path component (such as a file name), you can check for the existence
24
of any path separators ("/" or "\"), or ".." sequences in the input, and reject the input if any are found.
0 commit comments