Skip to content

Commit e63aabe

Browse files
authored
Typo fix in bypass-connect-csrf-protection-by-abusing.md (#141)
1 parent 779da2b commit e63aabe

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

docs/bypass-connect-csrf-protection-by-abusing.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ Considering the following code:
1818

1919
```js
2020
...
21-
app.use express.csrf()
21+
app.use(express.csrf())
2222
...
23-
app.use express.methodOverride()
23+
app.use(express.methodOverride())
2424
```
2525

2626
Connect's CSRF middleware does not check csrf tokens in case of idempotent verbs (GET/HEAD/OPTIONS, see lib/middleware/csrf.js). As a result, it is possible to bypass this security control by sending a GET request with a POST MethodOverride header or key.

0 commit comments

Comments
 (0)