浏览代码

Remove outdated note

Closes gh-15263
Marcus Hert Da Coregio 1 年之前
父节点
当前提交
8fd9997a47
共有 1 个文件被更改,包括 0 次插入5 次删除
  1. 0 5
      docs/modules/ROOT/pages/features/exploits/csrf.adoc

+ 0 - 5
docs/modules/ROOT/pages/features/exploits/csrf.adoc

@@ -208,11 +208,6 @@ The user receives an email at https://email.example.org that includes a link to
 If the user clicks on the link, they would rightfully expect to be authenticated to the social media site.
 If the user clicks on the link, they would rightfully expect to be authenticated to the social media site.
 However, if the `SameSite` attribute is `Strict`, the cookie would not be sent and so the user would not be authenticated.
 However, if the `SameSite` attribute is `Strict`, the cookie would not be sent and so the user would not be authenticated.
 
 
-[NOTE]
-====
-We could improve the protection and usability of `SameSite` protection against CSRF attacks by implementing https://github.com/spring-projects/spring-security/issues/7537[gh-7537].
-====
-
 Another obvious consideration is that, in order for the `SameSite` attribute to protect users, the browser must support the `SameSite` attribute.
 Another obvious consideration is that, in order for the `SameSite` attribute to protect users, the browser must support the `SameSite` attribute.
 Most modern browsers do https://developer.mozilla.org/en-US/docs/Web/HTTP/headers/Set-Cookie#Browser_compatibility[support the SameSite attribute].
 Most modern browsers do https://developer.mozilla.org/en-US/docs/Web/HTTP/headers/Set-Cookie#Browser_compatibility[support the SameSite attribute].
 However, older browsers that are still in use may not.
 However, older browsers that are still in use may not.