Skip to content

Commit 75b5c31

Browse files
authored
Change CWE reference in documentation for S607 rule (#7398)
<!-- Thank you for contributing to Ruff! To help us out with reviewing, please consider the following: - Does this pull request include a summary of the change? (See below.) - Does this pull request include a descriptive title? - Does this pull request include references to any relevant issues? --> ## Summary The previous reference was “CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')”, which describes another issue. The new reference is “CWE-426: Untrusted Search Path”, which describes exactly the problem that this rule should warn about. ## Test Plan The change was not tested, as it only changes two numbers in the documentation.
1 parent 450fb9b commit 75b5c31

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

crates/ruff/src/rules/flake8_bandit/rules/shell_injection.rs

+1-1
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ impl Violation for StartProcessWithNoShell {
148148
///
149149
/// ## References
150150
/// - [Python documentation: `subprocess.Popen()`](https://docs.python.org/3/library/subprocess.html#subprocess.Popen)
151-
/// - [Common Weakness Enumeration: CWE-78](https://cwe.mitre.org/data/definitions/78.html)
151+
/// - [Common Weakness Enumeration: CWE-426](https://cwe.mitre.org/data/definitions/426.html)
152152
#[violation]
153153
pub struct StartProcessWithPartialPath;
154154

0 commit comments

Comments
 (0)