Fixed #6097 -- Fixed some broken RST markup. Thanks, Simeon.
git-svn-id: http://code.djangoproject.com/svn/django/trunk@6828 bcc190cf-cafb-0310-a4f2-bffc1f526a37
This commit is contained in:
parent
0c1ba467ae
commit
04a20c0226
|
@ -340,7 +340,7 @@ That would result in a rendered template like this::
|
||||||
Clearly, user-submitted data shouldn't be trusted blindly and inserted directly
|
Clearly, user-submitted data shouldn't be trusted blindly and inserted directly
|
||||||
into your Web pages, because a malicious user could use this kind of hole to
|
into your Web pages, because a malicious user could use this kind of hole to
|
||||||
do potentially bad things. This type of security exploit is called a
|
do potentially bad things. This type of security exploit is called a
|
||||||
Cross Site Scripting`_ (XSS) attack.
|
`Cross Site Scripting`_ (XSS) attack.
|
||||||
|
|
||||||
To avoid this problem, you have two options:
|
To avoid this problem, you have two options:
|
||||||
|
|
||||||
|
@ -367,6 +367,8 @@ are escaped:
|
||||||
Again, we stress that this behavior is on by default. If you're using Django's
|
Again, we stress that this behavior is on by default. If you're using Django's
|
||||||
template system, you're protected.
|
template system, you're protected.
|
||||||
|
|
||||||
|
.. _Cross Site Scripting: http://en.wikipedia.org/wiki/Cross-site_scripting
|
||||||
|
|
||||||
How to turn it off
|
How to turn it off
|
||||||
------------------
|
------------------
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue