From d58a7a461400bf7d55d26a517640fb32eaefb45d Mon Sep 17 00:00:00 2001 From: Ryan Rudder <96507400+RRudder@users.noreply.github.com> Date: Fri, 5 May 2023 12:33:27 +1000 Subject: [PATCH] updates to recommendations for Binary planting variants Formatting was missing with the dot points of the links for more information --- .../no_privilege_escalation/recommendations.md | 4 ++-- .../recommendations.md | 4 ++-- .../client_side_injection/recommendations.md | 4 ++++ 3 files changed, 8 insertions(+), 4 deletions(-) diff --git a/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/no_privilege_escalation/recommendations.md b/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/no_privilege_escalation/recommendations.md index e87bffa6..f48dd026 100644 --- a/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/no_privilege_escalation/recommendations.md +++ b/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/no_privilege_escalation/recommendations.md @@ -2,8 +2,8 @@ There is no single technique to protect from binary planting. However, the following best practices should be adhered to: -All client-side input data should be validated based on the content it is reasonable to contain for users -When loading libraries or launching executable files, ensure that absolute paths are used. Do not use relative paths +- All client-side input data should be validated based on the content it is reasonable to contain for users +- When loading libraries or launching executable files, ensure that absolute paths are used. Do not use relative paths For more information, please see: diff --git a/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/non_default_folder_privilege_escalation/recommendations.md b/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/non_default_folder_privilege_escalation/recommendations.md index e87bffa6..f48dd026 100644 --- a/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/non_default_folder_privilege_escalation/recommendations.md +++ b/submissions/description/cross_site_scripting_xss/client_side_injection/binary_planting/non_default_folder_privilege_escalation/recommendations.md @@ -2,8 +2,8 @@ There is no single technique to protect from binary planting. However, the following best practices should be adhered to: -All client-side input data should be validated based on the content it is reasonable to contain for users -When loading libraries or launching executable files, ensure that absolute paths are used. Do not use relative paths +- All client-side input data should be validated based on the content it is reasonable to contain for users +- When loading libraries or launching executable files, ensure that absolute paths are used. Do not use relative paths For more information, please see: diff --git a/submissions/description/cross_site_scripting_xss/client_side_injection/recommendations.md b/submissions/description/cross_site_scripting_xss/client_side_injection/recommendations.md index 9f8040bd..00190e5e 100644 --- a/submissions/description/cross_site_scripting_xss/client_side_injection/recommendations.md +++ b/submissions/description/cross_site_scripting_xss/client_side_injection/recommendations.md @@ -5,3 +5,7 @@ There is no single technique to protect from client-side injection. However, the - All client-side input data should be validated based on the content it is reasonable to contain for users - When loading libraries or launching executable files, ensure that absolute paths are used. Do not use relative paths +For more information, please see: + +- +-