From 671691a5ed880ea02f99100a19a1e5ad10adb27f Mon Sep 17 00:00:00 2001 From: Elie De Brauwer Date: Sat, 23 May 2020 17:41:24 +0200 Subject: [PATCH] XXE_changing_content_type.adoc: Typo fixes --- .../resources/lessonPlans/en/XXE_changing_content_type.adoc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/webgoat-lessons/xxe/src/main/resources/lessonPlans/en/XXE_changing_content_type.adoc b/webgoat-lessons/xxe/src/main/resources/lessonPlans/en/XXE_changing_content_type.adoc index 73e4a9edd..b67abb801 100644 --- a/webgoat-lessons/xxe/src/main/resources/lessonPlans/en/XXE_changing_content_type.adoc +++ b/webgoat-lessons/xxe/src/main/resources/lessonPlans/en/XXE_changing_content_type.adoc @@ -1,6 +1,6 @@ == Modern REST framework -In modern REST frameworks the server might be able to accepts data formats that you as a developer did not think about. So this might result in JSON endpoints being vulnerable to XXE attacks. +In modern REST frameworks the server might be able to accept data formats that you as a developer did not think about. So this might result in JSON endpoints being vulnerable to XXE attacks. -Again same exercise but try to perform the same XML injection as we did in first assignment. +Again same exercise but try to perform the same XML injection as we did in the first assignment.