diff --git a/java/ql/src/Security/CWE/CWE-352/SpringCSRFProtection.qhelp b/java/ql/src/Security/CWE/CWE-352/SpringCSRFProtection.qhelp index af1119bcd1c5..a7e0b21d7e4b 100644 --- a/java/ql/src/Security/CWE/CWE-352/SpringCSRFProtection.qhelp +++ b/java/ql/src/Security/CWE/CWE-352/SpringCSRFProtection.qhelp @@ -5,7 +5,7 @@

When you set up a web server to receive a request from a client without any mechanism for verifying that it was intentionally sent, then it is vulnerable to attack. An attacker can trick a client into making an unintended request to the web server that will be treated as -an authentic request. This can be done via a URL, image load, XMLHttpRequest, etc. and can +an authentic request. This can be done via a URL, image load, XMLHttpRequest, etc. and can result in exposure of data or unintended code execution.

@@ -30,9 +30,9 @@ OWASP:
  • Spring Security Reference: - - Cross Site Request Forgery (CSRF) for Servlet Environments + + Cross Site Request Forgery (CSRF) .
  • - \ No newline at end of file +