Browse Source

Remove outdated note

Closes gh-15263
Marcus Hert Da Coregio 1 year ago
parent
commit
8fd9997a47
1 changed files with 0 additions and 5 deletions
  1. 0 5
      docs/modules/ROOT/pages/features/exploits/csrf.adoc

+ 0 - 5
docs/modules/ROOT/pages/features/exploits/csrf.adoc

@@ -208,11 +208,6 @@ The user receives an email at https://email.example.org that includes a link to
 If the user clicks on the link, they would rightfully expect to be authenticated to the social media site.
 If the user clicks on the link, they would rightfully expect to be authenticated to the social media site.
 However, if the `SameSite` attribute is `Strict`, the cookie would not be sent and so the user would not be authenticated.
 However, if the `SameSite` attribute is `Strict`, the cookie would not be sent and so the user would not be authenticated.
 
 
-[NOTE]
-====
-We could improve the protection and usability of `SameSite` protection against CSRF attacks by implementing https://github.com/spring-projects/spring-security/issues/7537[gh-7537].
-====
-
 Another obvious consideration is that, in order for the `SameSite` attribute to protect users, the browser must support the `SameSite` attribute.
 Another obvious consideration is that, in order for the `SameSite` attribute to protect users, the browser must support the `SameSite` attribute.
 Most modern browsers do https://developer.mozilla.org/en-US/docs/Web/HTTP/headers/Set-Cookie#Browser_compatibility[support the SameSite attribute].
 Most modern browsers do https://developer.mozilla.org/en-US/docs/Web/HTTP/headers/Set-Cookie#Browser_compatibility[support the SameSite attribute].
 However, older browsers that are still in use may not.
 However, older browsers that are still in use may not.