Explorar o código

SEC-2378: Fix CSRF MultipartFilter doc typo

Rob Winch %!s(int64=12) %!d(string=hai) anos
pai
achega
17b9f33351
Modificáronse 1 ficheiros con 1 adicións e 1 borrados
  1. 1 1
      docs/manual/src/asciidoctor/index.adoc

+ 1 - 1
docs/manual/src/asciidoctor/index.adoc

@@ -3105,7 +3105,7 @@ More information about using multipart forms with Spring can be found within the
 
 [[csrf-multipartfilter]]
 ====== Placing MultipartFilter before Spring Security
-The first option is to ensure that the `MultipartFilter` is specified before the Spring Security filter. Specifying the `MultipartFilter` after the Spring Security filter means that there is no authorization for invoking the `MultipartFilter` which means anyone can place temporary files on your server. However, only authorized users will be able to submit a File that is processed by your application. In general, this is the recommended approach because the temporary file upload should have a negligble impact on most servers.
+The first option is to ensure that the `MultipartFilter` is specified before the Spring Security filter. Specifying the `MultipartFilter` before the Spring Security filter means that there is no authorization for invoking the `MultipartFilter` which means anyone can place temporary files on your server. However, only authorized users will be able to submit a File that is processed by your application. In general, this is the recommended approach because the temporary file upload should have a negligble impact on most servers.
 
 To ensure `MultipartFilter` is specified before the Spring Security filter with java configuration, users can override beforeSpringSecurityFilterChain as shown below: