Skip to content

Commit 0cadf06

Browse files
Update general/development/policies/security/crosssite-request-forgery.md
Co-authored-by: Andrew Lyons <andrew@nicols.co.uk>
1 parent e44c7af commit 0cadf06

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

general/development/policies/security/crosssite-request-forgery.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ It may be a bit surprising, but this type of attack may be used against servers
3333

3434
### Session key (CSRF token) {#session-key}
3535

36-
The most important protection is the concept CSRF token, which is for historic reasons called **sesskey** in Moodle.
36+
The most important protection is the concept CSRF token, which is for historic reasons called **`sesskey`** in Moodle.
3737

3838
When you log in, Moodle generates a random string and stores it in the session. Whenever it prints a link or a button to perform a significant action, it adds the sesskey value to the submitted data. Before performing the action, it checks the sesskey value in the request with the one in the session, and the action is only performed if the two match.
3939

0 commit comments

Comments
 (0)