From 1135525eacbda195558fc92d0b4409fdf8e5cd7d Mon Sep 17 00:00:00 2001
From: Tim Graham <timograham@gmail.com>
Date: Mon, 18 Nov 2013 19:10:58 -0500
Subject: [PATCH] [1.5.x] Fixed typo in topics/http/sessions.txt.

Backport of 9348fc5628 from master
---
 docs/topics/http/sessions.txt | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/docs/topics/http/sessions.txt b/docs/topics/http/sessions.txt
index 2e4722b511..abc5d004b0 100644
--- a/docs/topics/http/sessions.txt
+++ b/docs/topics/http/sessions.txt
@@ -738,7 +738,7 @@ controlled by trusted users (or, are at least unable to set cookies).
 For example, an attacker could log into ``good.example.com`` and get a valid
 session for his account. If the attacker has control over ``bad.example.com``,
 he can use it to send his session key to you since a subdomain is permitted
-to set cookies on `*.example.com``. When you visit ``good.example.com``,
+to set cookies on ``*.example.com``. When you visit ``good.example.com``,
 you'll be logged in as the attacker and might inadvertently enter your
 sensitive personal data (e.g. credit card info) into the attackers account.