mirror of
https://github.com/github/codeql.git
synced 2026-04-26 09:15:12 +02:00
Java: update qhelp link
This commit is contained in:
@@ -5,7 +5,7 @@
|
||||
<p>When you set up a web server to receive a request from a client without any mechanism
|
||||
for verifying that it was intentionally sent, then it is vulnerable to attack. An attacker can
|
||||
trick a client into making an unintended request to the web server that will be treated as
|
||||
an authentic request. This can be done via a URL, image load, XMLHttpRequest, etc. and can
|
||||
an authentic request. This can be done via a URL, image load, XMLHttpRequest, etc. and can
|
||||
result in exposure of data or unintended code execution.</p>
|
||||
</overview>
|
||||
|
||||
@@ -30,9 +30,9 @@ OWASP:
|
||||
</li>
|
||||
<li>
|
||||
Spring Security Reference:
|
||||
<a href="https://docs.spring.io/spring-security/site/docs/current/reference/html5/#servlet-csrf">
|
||||
<a href="https://docs.spring.io/spring-security/reference/servlet/exploits/csrf.html#servlet-csrf">
|
||||
Cross Site Request Forgery (CSRF) for Servlet Environments
|
||||
</a>.
|
||||
</li>
|
||||
</references>
|
||||
</qhelp>
|
||||
</qhelp>
|
||||
|
||||
Reference in New Issue
Block a user