aboutsummaryrefslogtreecommitdiffstats
path: root/guides/source
diff options
context:
space:
mode:
authorPrathamesh Sonpatki <csonpatki@gmail.com>2016-11-19 17:15:19 +0530
committerPrathamesh Sonpatki <csonpatki@gmail.com>2016-11-19 17:15:19 +0530
commit04bb2d0dfae76c226a79f08291d372bc0b3a1b3a (patch)
treee4ed8a902b11a0e058aa94078061b1fb5cbdc87b /guides/source
parent3b2346ea1393ad5deb049ae071116773c602ddc0 (diff)
downloadrails-04bb2d0dfae76c226a79f08291d372bc0b3a1b3a.tar.gz
rails-04bb2d0dfae76c226a79f08291d372bc0b3a1b3a.tar.bz2
rails-04bb2d0dfae76c226a79f08291d372bc0b3a1b3a.zip
Remove mention of SafeErb gem [ci skip]
Followup of https://github.com/rails/rails/pull/27086
Diffstat (limited to 'guides/source')
-rw-r--r--guides/source/security.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/guides/source/security.md b/guides/source/security.md
index aea9728c10..54550ed3a7 100644
--- a/guides/source/security.md
+++ b/guides/source/security.md
@@ -377,7 +377,7 @@ In 2007 there was the first tailor-made trojan which stole information from an I
Having one single place in the admin interface or Intranet, where the input has not been sanitized, makes the entire application vulnerable. Possible exploits include stealing the privileged administrator's cookie, injecting an iframe to steal the administrator's password or installing malicious software through browser security holes to take over the administrator's computer.
-Refer to the Injection section for countermeasures against XSS. It is _recommended to use the SafeErb plugin_ also in an Intranet or administration interface.
+Refer to the Injection section for countermeasures against XSS.
**CSRF** Cross-Site Request Forgery (CSRF), also known as Cross-Site Reference Forgery (XSRF), is a gigantic attack method, it allows the attacker to do everything the administrator or Intranet user may do. As you have already seen above how CSRF works, here are a few examples of what attackers can do in the Intranet or admin interface.