aboutsummaryrefslogtreecommitdiffstats
path: root/railties/doc/guides/html/security.html
diff options
context:
space:
mode:
authorPratik Naik <pratiknaik@gmail.com>2009-01-31 21:25:15 +0000
committerPratik Naik <pratiknaik@gmail.com>2009-01-31 21:25:15 +0000
commitcfddbcd8e7a1d965c937c04bbf6112b60d1bb962 (patch)
tree0063c5eaf2552c8d4d37fc42a851b3af4e67eae8 /railties/doc/guides/html/security.html
parent9f097e3c83d36607bad55e2da8fcf2a2845a772e (diff)
downloadrails-cfddbcd8e7a1d965c937c04bbf6112b60d1bb962.tar.gz
rails-cfddbcd8e7a1d965c937c04bbf6112b60d1bb962.tar.bz2
rails-cfddbcd8e7a1d965c937c04bbf6112b60d1bb962.zip
Regenerate guides html
Diffstat (limited to 'railties/doc/guides/html/security.html')
-rw-r--r--railties/doc/guides/html/security.html2
1 files changed, 1 insertions, 1 deletions
diff --git a/railties/doc/guides/html/security.html b/railties/doc/guides/html/security.html
index 4751e9f92b..371decda64 100644
--- a/railties/doc/guides/html/security.html
+++ b/railties/doc/guides/html/security.html
@@ -326,7 +326,7 @@ The user has his credit back.
</div>
</div>
<div class="paragraph"><p>This attack focuses on fixing a user&#8217;s session id known to the attacker, and forcing the user&#8217;s browser into using this id. It is therefore not necessary for the attacker to steal the session id afterwards. Here is how this attack works:</p></div>
-<div class="olist"><ol>
+<div class="olist arabic"><ol class="arabic">
<li>
<p>
The attacker creates a valid session id: He loads the login page of the web application where he wants to fix the session, and takes the session id in the cookie from the response (see number 1 and 2 in the image).