Skip to content

Commit cbb5e32

Browse files
author
Jay Bryant
committed
Wording changes
Making a suggested change to my earlier commit.
1 parent 4dd7130 commit cbb5e32

File tree

1 file changed

+1
-1
lines changed
  • docs/manual/src/docs/asciidoc/_includes/about/exploits

1 file changed

+1
-1
lines changed

docs/manual/src/docs/asciidoc/_includes/about/exploits/csrf.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -349,7 +349,7 @@ One might ask why the expected CSRF token isn't stored in a cookie by default.
349349
This is because there are known exploits in which headers (for example, to specify the cookies) can be set by another domain.
350350
This is the same reason Ruby on Rails https://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails/[no longer skips CSRF checks when the header X-Requested-With is present].
351351
See http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2011-February/007533.html[this webappsec.org thread] for details on how to perform the exploit.
352-
Another disadvantage is that by removing the state (that is, the timeout), you lose the ability to forcibly end the token if it is compromised.
352+
Another disadvantage is that by removing the state (that is, the timeout), you lose the ability to forcibly invalidate the token if it is compromised.
353353

354354
// FIXME: Document timeout with lengthy form expire. We do not want to automatically replay that request because it can lead to exploit
355355

0 commit comments

Comments
 (0)