We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 2a5908f commit 1c7e533Copy full SHA for 1c7e533
python/ql/src/Security/CWE-352/CSRFProtectionDisabled.ql
@@ -33,5 +33,5 @@ where
33
// We have seen examples of dummy projects with vulnerable settings alongside a main
34
// project with a protecting settings file. We want to rule out this scenario, so we
35
// require all non-test settings to be vulnerable.
36
- forall( HTTP::Server::CsrfProtectionSetting s| relevantSetting(s) | vulnerableSetting(s) )
+ forall(HTTP::Server::CsrfProtectionSetting s | relevantSetting(s) | vulnerableSetting(s))
37
select setting, "Potential CSRF vulnerability due to forgery protection being disabled or weakened."
0 commit comments