Skip to content

Commit

Permalink
Remove experimental version + qhelp fixes
Browse files Browse the repository at this point in the history
  • Loading branch information
joefarebrother committed Nov 21, 2024
1 parent 9ef3cd1 commit 66e173c
Show file tree
Hide file tree
Showing 21 changed files with 2 additions and 660 deletions.
4 changes: 2 additions & 2 deletions python/ql/src/Security/CWE-074/TemplateInjection.qhelp
Original file line number Diff line number Diff line change
Expand Up @@ -16,10 +16,10 @@
<sample src="examples/JinjaBad.py" />

<p>The following is an example of a string that could be used to cause remote code execution when interpreted as a template:</p>
<sample src="examples/template_exploit" />
<sample src="examples/template_exploit.txt" />

<p>In the following case, user input is not used to construct the template; rather is only used for as the parameters to render the template, which is safe.</p>
<sample scr="examples/JinjaGoodParam" />
<sample src="examples/JinjaGoodParam.py" />

<p>In the following case, a <code>SandboxedEnvironment</code> is used, preventing remote code execution.</p>
<sample src="examples/JinjaGoodSandbox.py" />
Expand Down
19 changes: 0 additions & 19 deletions python/ql/src/experimental/Security/CWE-074/JinjaBad.py

This file was deleted.

20 changes: 0 additions & 20 deletions python/ql/src/experimental/Security/CWE-074/JinjaGood.py

This file was deleted.

This file was deleted.

This file was deleted.

20 changes: 0 additions & 20 deletions python/ql/src/experimental/Security/CWE-074/TemplateInjection.ql

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

This file was deleted.

Loading

0 comments on commit 66e173c

Please sign in to comment.