summaryrefslogtreecommitdiff
path: root/doc/security/webhooks.md
diff options
context:
space:
mode:
authorMark Chao <mchao@gitlab.com>2018-05-25 14:18:42 +0800
committerMark Chao <mchao@gitlab.com>2018-06-06 21:01:44 +0900
commit15469fe0a1625449d4bb27208b444e3c72afaaa0 (patch)
tree3fee4baebf632633547f11a809940775f470e6b3 /doc/security/webhooks.md
parent8c24e78b999263b177e40d363699b4dd60c16782 (diff)
downloadgitlab-ce-15469fe0a1625449d4bb27208b444e3c72afaaa0.tar.gz
doc
Diffstat (limited to 'doc/security/webhooks.md')
-rw-r--r--doc/security/webhooks.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/security/webhooks.md b/doc/security/webhooks.md
index a573445ab5b..b17b0a4bc4a 100644
--- a/doc/security/webhooks.md
+++ b/doc/security/webhooks.md
@@ -2,7 +2,7 @@
If you have non-GitLab web services running on your GitLab server or within its local network, these may be vulnerable to exploitation via Webhooks.
-With [Webhooks](../user/project/integrations/webhooks.md), you and your project masters and owners can set up URLs to be triggered when specific things happen to projects. Normally, these requests are sent to external web services specifically set up for this purpose, that process the request and its attached data in some appropriate way.
+With [Webhooks](../user/project/integrations/webhooks.md), you and your project maintainers and owners can set up URLs to be triggered when specific things happen to projects. Normally, these requests are sent to external web services specifically set up for this purpose, that process the request and its attached data in some appropriate way.
Things get hairy, however, when a Webhook is set up with a URL that doesn't point to an external, but to an internal service, that may do something completely unintended when the webhook is triggered and the POST request is sent.