Skip to content

Commit 7b19d39

Browse files
Update javascript/frameworks/ui5/src/UI5PathInjection/UI5PathInjection.md
Co-authored-by: Mauro Baluda <[email protected]>
1 parent e5b4b78 commit 7b19d39

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

javascript/frameworks/ui5/src/UI5PathInjection/UI5PathInjection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ sap.ui.define([
5656
});
5757
```
5858

59-
Even if the server which updates the OData V2 model is in a trusted domain such as within the organization, the server may still contain a tainted information if the UI5 application in question is already vulnerable to some other vulnerabilities, say XSS. This may lead to the attacker being able to save a file in the victim's local filesystem with the given filename which might be used for further attacks.
59+
Even if the server which updates the OData V2 model is in a trusted domain such as within the organization, the server may still contain tainted information if the UI5 application in question is vulnerable to other security attacks, say XSS. This may allow an attacker to save a file in the victim's local filesystem.
6060

6161
## References
6262

0 commit comments

Comments
 (0)