diff options
author | Pratik Naik <pratiknaik@gmail.com> | 2009-01-31 21:25:15 +0000 |
---|---|---|
committer | Pratik Naik <pratiknaik@gmail.com> | 2009-01-31 21:25:15 +0000 |
commit | cfddbcd8e7a1d965c937c04bbf6112b60d1bb962 (patch) | |
tree | 0063c5eaf2552c8d4d37fc42a851b3af4e67eae8 /railties/doc/guides/html/security.html | |
parent | 9f097e3c83d36607bad55e2da8fcf2a2845a772e (diff) | |
download | rails-cfddbcd8e7a1d965c937c04bbf6112b60d1bb962.tar.gz rails-cfddbcd8e7a1d965c937c04bbf6112b60d1bb962.tar.bz2 rails-cfddbcd8e7a1d965c937c04bbf6112b60d1bb962.zip |
Regenerate guides html
Diffstat (limited to 'railties/doc/guides/html/security.html')
-rw-r--r-- | railties/doc/guides/html/security.html | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/railties/doc/guides/html/security.html b/railties/doc/guides/html/security.html index 4751e9f92b..371decda64 100644 --- a/railties/doc/guides/html/security.html +++ b/railties/doc/guides/html/security.html @@ -326,7 +326,7 @@ The user has his credit back. </div>
</div>
<div class="paragraph"><p>This attack focuses on fixing a user’s session id known to the attacker, and forcing the user’s browser into using this id. It is therefore not necessary for the attacker to steal the session id afterwards. Here is how this attack works:</p></div>
-<div class="olist"><ol>
+<div class="olist arabic"><ol class="arabic">
<li>
<p>
The attacker creates a valid session id: He loads the login page of the web application where he wants to fix the session, and takes the session id in the cookie from the response (see number 1 and 2 in the image).
|