Skip to content

Commit 5062369

Browse files
author
Max Schaefer
committed
JavaScript: Address doc review comments.
1 parent 45574d4 commit 5062369

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

javascript/ql/src/Security/CWE-754/UnvalidatedDynamicMethodCall.qhelp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
<overview>
77
<p>
88
JavaScript makes it easy to look up object properties dynamically at runtime. In particular, methods
9-
can be looked up by name and then called. However, if he method name is user controlled, an attacker
9+
can be looked up by name and then called. However, if the method name is user-controlled, an attacker
1010
could choose a name that makes the application invoke an unexpected method, which may cause a runtime
1111
exception. If this exception is not handled, it could be used to mount a denial-of-service attack.
1212
</p>
@@ -33,7 +33,7 @@ If the dynamic method lookup cannot be avoided, consider whitelisting permitted
3333
the very least, check that the method is an own property and not inherited from the prototype object.
3434
If the object on which the method is looked up contains properties that are not methods, you
3535
should additionally check that the result of the lookup is a function. Even if the object only
36-
contains methods it is still a good idea to perform this check in case other properties are
36+
contains methods, it is still a good idea to perform this check in case other properties are
3737
added to the object later on.
3838
</p>
3939
</recommendation>

0 commit comments

Comments
 (0)