Skip to content

Commit 93e05db

Browse files
committed
Python: remove doubles spaces from qhelp
1 parent ed9477a commit 93e05db

1 file changed

Lines changed: 4 additions & 4 deletions

File tree

python/ql/src/Security/CWE-502/UnsafeDeserialization.qhelp

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,15 @@
55
<p>
66
Deserializing untrusted data using any deserialization framework that
77
allows the construction of arbitrary serializable objects is easily exploitable
8-
and in many cases allows an attacker to execute arbitrary code. Even before a
8+
and in many cases allows an attacker to execute arbitrary code. Even before a
99
deserialized object is returned to the caller of a deserialization method a lot
1010
of code may have been executed, including static initializers, constructors,
11-
and finalizers. Automatic deserialization of fields means that an attacker may
11+
and finalizers. Automatic deserialization of fields means that an attacker may
1212
craft a nested combination of objects on which the executed initialization code
1313
may have unforeseen effects, such as the execution of arbitrary code.
1414
</p>
1515
<p>
16-
There are many different serialization frameworks. This query currently
16+
There are many different serialization frameworks. This query currently
1717
supports Pickle, Marshal and Yaml.
1818
</p>
1919
<p>
@@ -28,7 +28,7 @@ user-controlled type resolution.
2828

2929
<recommendation>
3030
<p>
31-
Avoid deserialization of untrusted data if at all possible. If the
31+
Avoid deserialization of untrusted data if at all possible. If the
3232
architecture permits it then use other formats instead of serialized objects,
3333
for example JSON.
3434
</p>

0 commit comments

Comments
 (0)