diff --git a/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S2589.html b/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S2589.html index a0b3b419eed..da04131e0cb 100644 --- a/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S2589.html +++ b/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S2589.html @@ -23,12 +23,7 @@

Compliant Solution

See

diff --git a/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S2598.html b/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S2598.html index b07f57b38ff..4e9af5ee252 100644 --- a/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S2598.html +++ b/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S2598.html @@ -1,6 +1,8 @@

These minimum restrictions should be applied when handling file uploads:

-

- the file upload folder to restrict untrusted files to a specific folder.

-

- the file extension of the uploaded file to prevent remote code execution.

+

Also the size of the uploaded file should be limited to prevent denial of service attacks. This requirement is covered by the rule S5693.

Noncompliant Code Example

formidable module:

diff --git a/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S4818.html b/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S4818.html index 164769bf2d0..8d225f213d0 100644 --- a/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S4818.html +++ b/javascript-checks/src/main/resources/org/sonar/l10n/javascript/rules/javascript/S4818.html @@ -18,7 +18,7 @@

Ask Yourself Whether

  • input received from sockets is used without being sanitized.
  • sensitive data is sent via sockets without being encrypted.
  • -

    You are at risk if you answered yes to any of these questions.

    +

    There is a risk if you answered yes to any of those questions.

    Recommended Secure Coding Practices