Skip to content

Commit

Permalink
Modify rule S6376: Fix broken link (#4208)
Browse files Browse the repository at this point in the history
  • Loading branch information
johann-beleites-sonarsource authored Aug 29, 2024
1 parent db883d1 commit 4e78255
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions rules/S6376/java/rule.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ XML files are complex data structures. When a malicious user is able to submit a

=== What is the potential impact?

When an attacker successfully exploits the vulnerability, it can lead to a Denial of Service (DoS) condition.
When an attacker successfully exploits the vulnerability, it can lead to a Denial of Service (DoS) condition.

=== System Unavailability

Expand All @@ -32,7 +32,7 @@ include::how-to-fix-it/jdom2.adoc[]
* Java Documentation - https://docs.oracle.com/en/java/javase/21/docs/api/java.xml/javax/xml/transform/TransformerFactory.html[TransformerFactory Class]
* Java Documentation - https://docs.oracle.com/en/java/javase/21/security/java-api-xml-processing-jaxp-security-guide.html[Java API for XML Processing (JAXP) Security Guide]
* Dom4j Documentation - https://dom4j.github.io/javadoc/2.1.4/org/dom4j/io/SAXReader.html[SAXReader Class]
* Jdom2 Documentation - http://www.jdom.org/docs/apidocs/org/jdom2/input/SAXBuilder.html[SAXBuilder class]
* Jdom2 Documentation - https://javadoc.io/static/org.jdom/jdom2/2.0.6.1/org/jdom2/input/SAXBuilder.html[SAXBuilder class]
* OWASP - https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html#java[XXE Prevention Cheat Sheet]

=== Standards
Expand Down

0 comments on commit 4e78255

Please sign in to comment.