aboutsummaryrefslogtreecommitdiffstats
path: root/guides/source
diff options
context:
space:
mode:
authorVijay Dev <vijaydev.cse@gmail.com>2016-12-16 15:21:06 +0000
committerVijay Dev <vijaydev.cse@gmail.com>2016-12-16 15:21:06 +0000
commit0aae8aec3b6c73b9f1f0dae78b0683038f36bc59 (patch)
tree56a48fc1d7b15e771626b5c79c834b6ba91eea79 /guides/source
parenta47efcfcaee01c1143de459d3864f2c35fb566d4 (diff)
parent04bb2d0dfae76c226a79f08291d372bc0b3a1b3a (diff)
downloadrails-0aae8aec3b6c73b9f1f0dae78b0683038f36bc59.tar.gz
rails-0aae8aec3b6c73b9f1f0dae78b0683038f36bc59.tar.bz2
rails-0aae8aec3b6c73b9f1f0dae78b0683038f36bc59.zip
Merge branch 'master' of github.com:rails/docrails
Diffstat (limited to 'guides/source')
-rw-r--r--guides/source/security.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/guides/source/security.md b/guides/source/security.md
index bb67eb75d9..a81a782cf2 100644
--- a/guides/source/security.md
+++ b/guides/source/security.md
@@ -377,7 +377,7 @@ In 2007 there was the first tailor-made trojan which stole information from an I
Having one single place in the admin interface or Intranet, where the input has not been sanitized, makes the entire application vulnerable. Possible exploits include stealing the privileged administrator's cookie, injecting an iframe to steal the administrator's password or installing malicious software through browser security holes to take over the administrator's computer.
-Refer to the Injection section for countermeasures against XSS. It is _recommended to use the SafeErb plugin_ also in an Intranet or administration interface.
+Refer to the Injection section for countermeasures against XSS.
**CSRF** Cross-Site Request Forgery (CSRF), also known as Cross-Site Reference Forgery (XSRF), is a gigantic attack method, it allows the attacker to do everything the administrator or Intranet user may do. As you have already seen above how CSRF works, here are a few examples of what attackers can do in the Intranet or admin interface.