Skip to content

Commit 82c6a4b

Browse files
authored
Use the correct article in front of the XSS abbreviation (#1635)
1 parent 05158b0 commit 82c6a4b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

cheatsheets/JSON_Web_Token_for_Java_Cheat_Sheet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -471,7 +471,7 @@ This occurs when an application stores the token in a manner exhibiting the foll
471471
1. Add it as a *Bearer* HTTP `Authentication` header with JavaScript when calling services.
472472
1. Add [fingerprint](JSON_Web_Token_for_Java_Cheat_Sheet.md#token-sidejacking) information to the token.
473473

474-
By storing the token in browser *sessionStorage* container it exposes the token to being stolen through a XSS attack. However, fingerprints added to the token prevent reuse of the stolen token by the attacker on their machine. To close a maximum of exploitation surfaces for an attacker, add a browser [Content Security Policy](https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html) to harden the execution context.
474+
By storing the token in browser *sessionStorage* container it exposes the token to being stolen through an XSS attack. However, fingerprints added to the token prevent reuse of the stolen token by the attacker on their machine. To close a maximum of exploitation surfaces for an attacker, add a browser [Content Security Policy](https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html) to harden the execution context.
475475

476476
But, we know that *sessionStorage* is not always practical due to its per-tab scope, and the storage method for tokens should balance *security* and *usability*.
477477

0 commit comments

Comments
 (0)