From d4739a2fb4c276bb7363bda02b4b08b10d77d612 Mon Sep 17 00:00:00 2001 From: Jonathan Leitschuh Date: Thu, 20 Jan 2022 15:27:57 +0000 Subject: [PATCH] Improve TempDirHijackingVulnerability message --- .../src/Security/CWE/CWE-378/TempDirHijackingVulnerability.ql | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/java/ql/src/Security/CWE/CWE-378/TempDirHijackingVulnerability.ql b/java/ql/src/Security/CWE/CWE-378/TempDirHijackingVulnerability.ql index 632d43bb3fdf6..ff27b63b9e714 100644 --- a/java/ql/src/Security/CWE/CWE-378/TempDirHijackingVulnerability.ql +++ b/java/ql/src/Security/CWE/CWE-378/TempDirHijackingVulnerability.ql @@ -123,4 +123,4 @@ where isUnsafeUseUnconstrainedByIfCheck(sink, unsafe) and isNonThrowingDirectoryCreationExpression(sink.asExpr(), creationCall) select deleteCheckpoint.getNode(), source, deleteCheckpoint, - "Local temporary directory hijacking race condition $@ file $@ may have been hijacked", creationCall, "here", unsafe, "here" + "Local temporary directory hijacking race condition $@, file $@ may have been hijacked", creationCall, "here", unsafe, "here"