aboutsummaryrefslogtreecommitdiffstats
path: root/guides/source/security.md
diff options
context:
space:
mode:
authorYoshiyuki Hirano <yhirano@me.com>2018-03-31 23:36:23 +0900
committerYoshiyuki Hirano <yhirano@me.com>2018-03-31 23:50:51 +0900
commite5bd4adce9a564302bede02ac93dc967e69df73c (patch)
tree3212cbc1feea1016966f3a6c2fecb7f649cf5006 /guides/source/security.md
parentb1a0ab179f23888eaadacd8292cbcec49ab06fdf (diff)
downloadrails-e5bd4adce9a564302bede02ac93dc967e69df73c.tar.gz
rails-e5bd4adce9a564302bede02ac93dc967e69df73c.tar.bz2
rails-e5bd4adce9a564302bede02ac93dc967e69df73c.zip
Put images into each page's dir in guides
Diffstat (limited to 'guides/source/security.md')
-rw-r--r--guides/source/security.md4
1 files changed, 2 insertions, 2 deletions
diff --git a/guides/source/security.md b/guides/source/security.md
index b419f7b48d..ffd7e66fc5 100644
--- a/guides/source/security.md
+++ b/guides/source/security.md
@@ -217,7 +217,7 @@ The best _solution against it is not to store this kind of data in a session, bu
NOTE: _Apart from stealing a user's session ID, the attacker may fix a session ID known to them. This is called session fixation._
-![Session fixation](images/session_fixation.png)
+![Session fixation](images/security/session_fixation.png)
This attack focuses on fixing a user's session ID known to the attacker, and forcing the user's browser into using this ID. It is therefore not necessary for the attacker to steal the session ID afterwards. Here is how this attack works:
@@ -272,7 +272,7 @@ Cross-Site Request Forgery (CSRF)
This attack method works by including malicious code or a link in a page that accesses a web application that the user is believed to have authenticated. If the session for that web application has not timed out, an attacker may execute unauthorized commands.
-![](images/csrf.png)
+![](images/security/csrf.png)
In the [session chapter](#sessions) you have learned that most Rails applications use cookie-based sessions. Either they store the session ID in the cookie and have a server-side session hash, or the entire session hash is on the client-side. In either case the browser will automatically send along the cookie on every request to a domain, if it can find a cookie for that domain. The controversial point is that if the request comes from a site of a different domain, it will also send the cookie. Let's start with an example: