mirror of
https://github.com/github/codeql.git
synced 2026-03-22 07:26:45 +01:00
JS: address doc review
This commit is contained in:
@@ -5,7 +5,7 @@
|
||||
<p>
|
||||
Using the HTTP Host header to construct a link in an email can facilitate phishing attacks and leak password reset tokens.
|
||||
A malicious user can send an HTTP request to the targeted web site, but with a Host header that refers to his own web site.
|
||||
This means the emails will be sent out to potential victims, originating from a server they trust but with
|
||||
This means the emails will be sent out to potential victims, originating from a server they trust, but with
|
||||
links leading to a malicious web site.
|
||||
</p>
|
||||
<p>
|
||||
|
||||
@@ -14,6 +14,6 @@ app.post('/resetpass', (req, res) => {
|
||||
from: 'webmaster@example.com',
|
||||
to: email,
|
||||
subject: 'Forgot password',
|
||||
text: `Forgot your password?. Click here to reset: https://${req.host}/resettoken/${token}`,
|
||||
text: `Click to reset password: https://${req.host}/resettoken/${token}`,
|
||||
});
|
||||
});
|
||||
|
||||
@@ -14,6 +14,6 @@ app.post('/resetpass', (req, res) => {
|
||||
from: 'webmaster@example.com',
|
||||
to: email,
|
||||
subject: 'Forgot password',
|
||||
text: `Forgot your password?. Click here to reset: https://${config.hostname}/resettoken/${token}`,
|
||||
text: `Click to reset password: https://${config.hostname}/resettoken/${token}`,
|
||||
});
|
||||
});
|
||||
|
||||
Reference in New Issue
Block a user