From: Miss Islington (bot) <31488909+miss-islington@users.noreply.github.com> Date: Fri, 14 May 2021 17:13:40 +0000 (-0700) Subject: [doc] Fix typos in cgi.rst (GH-24766) (GH-26131) X-Git-Tag: v3.9.6~100 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=9bc96c0146f3980bef60f5619915623b4748f0cd;p=thirdparty%2FPython%2Fcpython.git [doc] Fix typos in cgi.rst (GH-24766) (GH-26131) (cherry picked from commit 19d839ae20db9c6f740646e99df7f4601cb9f4dc) Co-authored-by: Géry Ogam --- diff --git a/Doc/library/cgi.rst b/Doc/library/cgi.rst index e60a3f13595c..0c985c07040c 100644 --- a/Doc/library/cgi.rst +++ b/Doc/library/cgi.rst @@ -316,7 +316,7 @@ algorithms implemented in this module in other circumstances. .. function:: test() Robust test CGI script, usable as main program. Writes minimal HTTP headers and - formats all information provided to the script in HTML form. + formats all information provided to the script in HTML format. .. function:: print_environ() @@ -346,8 +346,8 @@ Caring about security .. index:: pair: CGI; security -There's one important rule: if you invoke an external program (via the -:func:`os.system` or :func:`os.popen` functions. or others with similar +There's one important rule: if you invoke an external program (via +:func:`os.system`, :func:`os.popen` or other functions with similar functionality), make very sure you don't pass arbitrary strings received from the client to the shell. This is a well-known security hole whereby clever hackers anywhere on the Web can exploit a gullible CGI script to invoke @@ -424,7 +424,7 @@ above on installing your CGI script carefully can save you a lot of time. If you wonder whether you have understood the installation procedure correctly, try installing a copy of this module file (:file:`cgi.py`) as a CGI script. When invoked as a script, the file will dump its environment and the contents of the -form in HTML form. Give it the right mode etc, and send it a request. If it's +form in HTML format. Give it the right mode etc., and send it a request. If it's installed in the standard :file:`cgi-bin` directory, it should be possible to send it a request by entering a URL into your browser of the form: