Skip to content

Commit 903a9d5

Browse files
committed
copy edits [ci skip]
1 parent 4f031c8 commit 903a9d5

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

guides/source/security.textile

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -240,12 +240,12 @@ It is common to use persistent cookies to store user information, with +cookies.
240240

241241
<ruby>
242242
def handle_unverified_request
243-
super
244-
sign_out_user # Example method that will destroy the user cookies.
243+
super
244+
sign_out_user # Example method that will destroy the user cookies.
245245
end
246246
</ruby>
247247

248-
The above method could be placed in the +ApplicationController+ and will be called when a CSRF token is not present on a POST request.
248+
The above method can be placed in the +ApplicationController+ and will be called when a CSRF token is not present on a non-GET request.
249249

250250
Note that _(highlight)cross-site scripting (XSS) vulnerabilities bypass all CSRF protections_. XSS gives the attacker access to all elements on a page, so he can read the CSRF security token from a form or directly submit the form. Read <a href="#cross-site-scripting-xss">more about XSS</a> later.
251251

0 commit comments

Comments
 (0)