lib/roda/plugins/route_csrf.rb in roda-3.73.0 vs lib/roda/plugins/route_csrf.rb in roda-3.74.0

- old
+ new

@@ -20,12 +20,14 @@ # (except in the session), so that it is not possible for an attacker # to generate valid CSRF tokens specific to an arbitrary request method # and request path even if they have access to a token that is not # specific to request method and request path. To get this security # benefit, you must ensure an attacker does not have access to the - # session. Rack::Session::Cookie uses signed sessions, not encrypted + # session. Rack::Session::Cookie versions shipped with Rack before + # Rack 3 use signed sessions, not encrypted # sessions, so if the attacker has the ability to read cookie data - # and you are using Rack::Session::Cookie, it will still be possible + # and you are using one of those Rack::Session::Cookie versions, + # it will still be possible # for an attacker to generate valid CSRF tokens specific to arbitrary # request method and request path. Roda's session plugin uses # encrypted sessions and therefore is safe even if the attacker can # read cookie data. #