From 4e782555ed7a86bda55aeb77c5322c212813348f Mon Sep 17 00:00:00 2001 From: Johann Beleites Date: Thu, 29 Aug 2024 16:59:57 +0200 Subject: [PATCH] Modify rule S6376: Fix broken link (#4208) --- rules/S6376/java/rule.adoc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/rules/S6376/java/rule.adoc b/rules/S6376/java/rule.adoc index d596252e367..85685964213 100644 --- a/rules/S6376/java/rule.adoc +++ b/rules/S6376/java/rule.adoc @@ -6,7 +6,7 @@ XML files are complex data structures. When a malicious user is able to submit a === What is the potential impact? -When an attacker successfully exploits the vulnerability, it can lead to a Denial of Service (DoS) condition. +When an attacker successfully exploits the vulnerability, it can lead to a Denial of Service (DoS) condition. === System Unavailability @@ -32,7 +32,7 @@ include::how-to-fix-it/jdom2.adoc[] * Java Documentation - https://docs.oracle.com/en/java/javase/21/docs/api/java.xml/javax/xml/transform/TransformerFactory.html[TransformerFactory Class] * Java Documentation - https://docs.oracle.com/en/java/javase/21/security/java-api-xml-processing-jaxp-security-guide.html[Java API for XML Processing (JAXP) Security Guide] * Dom4j Documentation - https://dom4j.github.io/javadoc/2.1.4/org/dom4j/io/SAXReader.html[SAXReader Class] -* Jdom2 Documentation - http://www.jdom.org/docs/apidocs/org/jdom2/input/SAXBuilder.html[SAXBuilder class] +* Jdom2 Documentation - https://javadoc.io/static/org.jdom/jdom2/2.0.6.1/org/jdom2/input/SAXBuilder.html[SAXBuilder class] * OWASP - https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html#java[XXE Prevention Cheat Sheet] === Standards