Skip to content

Commit c6a71cd

Browse files
Jami CogswellJami Cogswell
authored andcommitted
Java: minor qhelp updates
1 parent 0367846 commit c6a71cd

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

java/ql/src/Security/CWE/CWE-352/CsrfUnprotectedRequestType.qhelp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010

1111
<p>
1212
The attacker tricks an authenticated user into submitting a request to the
13-
web application. Typically this request will result in a state change on
13+
web application. Typically, this request will result in a state change on
1414
the server, such as changing the user's password. The request can be
1515
initiated when the user visits a site controlled by the attacker. If the
1616
web application relies only on cookies for authentication, or on other
@@ -51,7 +51,7 @@ application state. Instead, use the <code>POST</code> method which Stapler defau
5151
<references>
5252
<li>
5353
OWASP:
54-
<a href="https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)">Cross-Site Request Forgery (CSRF)</a>.
54+
<a href="https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)">Cross Site Request Forgery (CSRF)</a>.
5555
</li>
5656
<li>
5757
Spring Security Reference:

0 commit comments

Comments
 (0)