diff options
author | Prem Sichanugrist <s@sikachu.com> | 2012-08-02 14:20:49 -0400 |
---|---|---|
committer | Prem Sichanugrist <s@sikachu.com> | 2012-08-02 14:20:49 -0400 |
commit | f8d1b52a4ffe56b8c6652b9cb0b7e9f8027fc05a (patch) | |
tree | f6f961b6825da56f4d8b718380bf4df4b970bbd4 /guides/source/security.textile | |
parent | eb66eadfc627cbe6bfebdff7d5a1dfb01f00cd21 (diff) | |
download | rails-f8d1b52a4ffe56b8c6652b9cb0b7e9f8027fc05a.tar.gz rails-f8d1b52a4ffe56b8c6652b9cb0b7e9f8027fc05a.tar.bz2 rails-f8d1b52a4ffe56b8c6652b9cb0b7e9f8027fc05a.zip |
Audit the usage of the word "JavaScript"
Diffstat (limited to 'guides/source/security.textile')
-rw-r--r-- | guides/source/security.textile | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/guides/source/security.textile b/guides/source/security.textile index 8879122b66..49e5da6bb7 100644 --- a/guides/source/security.textile +++ b/guides/source/security.textile @@ -608,7 +608,7 @@ This URL passes the filter because the regular expression matches – the second link_to "Homepage", @user.homepage </ruby> -The link looks innocent to visitors, but when it's clicked, it will execute the javascript function "exploit_code" or any other javascript the attacker provides. +The link looks innocent to visitors, but when it's clicked, it will execute the JavaScript function "exploit_code" or any other JavaScript the attacker provides. To fix the regular expression, \A and \z should be used instead of ^ and $, like so: |