summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorterminator14 <terminator14@users.noreply.github.com>2019-07-23 07:10:58 -0600
committerMariusz Felisiak <felisiak.mariusz@gmail.com>2019-07-23 15:11:54 +0200
commit61d4a159899358e3570dfc5db039651325b30992 (patch)
tree47ea93051f8d9bb7a2a0272992d32543a92a329c /docs
parent2d2859bec27c9e3994cff6be56dd5fe0f694a24c (diff)
[2.2.x] Fixed typo in docs/topics/http/sessions.txt.
Backport of 8323691de0ba120dbdc8055063574df2b0c0afa4 from master
Diffstat (limited to 'docs')
-rw-r--r--docs/topics/http/sessions.txt2
1 files changed, 1 insertions, 1 deletions
diff --git a/docs/topics/http/sessions.txt b/docs/topics/http/sessions.txt
index 745c735e46..f0311f6fa1 100644
--- a/docs/topics/http/sessions.txt
+++ b/docs/topics/http/sessions.txt
@@ -651,7 +651,7 @@ session for their account. If the attacker has control over ``bad.example.com``,
they can use it to send their session key to you since a subdomain is permitted
to set cookies on ``*.example.com``. When you visit ``good.example.com``,
you'll be logged in as the attacker and might inadvertently enter your
-sensitive personal data (e.g. credit card info) into the attackers account.
+sensitive personal data (e.g. credit card info) into the attacker's account.
Another possible attack would be if ``good.example.com`` sets its
:setting:`SESSION_COOKIE_DOMAIN` to ``"example.com"`` which would cause