Skip to content

Commit

Permalink
Fixed link for in_place_editor [ci skip]
Browse files Browse the repository at this point in the history
closes #16512
  • Loading branch information
arunagw committed Aug 15, 2014
1 parent 60b2d29 commit 967a2ff
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion guides/source/security.md
Expand Up @@ -847,7 +847,7 @@ It is recommended to _use RedCloth in combination with a whitelist input filter_

NOTE: _The same security precautions have to be taken for Ajax actions as for "normal" ones. There is at least one exception, however: The output has to be escaped in the controller already, if the action doesn't render a view._

If you use the [in_place_editor plugin](http://dev.rubyonrails.org/browser/plugins/in_place_editing), or actions that return a string, rather than rendering a view, _you have to escape the return value in the action_. Otherwise, if the return value contains a XSS string, the malicious code will be executed upon return to the browser. Escape any input value using the h() method.
If you use the [in_place_editor plugin](https://github.com/rails/in_place_editing), or actions that return a string, rather than rendering a view, _you have to escape the return value in the action_. Otherwise, if the return value contains a XSS string, the malicious code will be executed upon return to the browser. Escape any input value using the h() method.

### Command Line Injection

Expand Down

0 comments on commit 967a2ff

Please sign in to comment.