diff --git a/owasp-top10-2017-apps/a5/ecommerce-api/README.md b/owasp-top10-2017-apps/a5/ecommerce-api/README.md index 93e327a2c..c61844cc4 100644 --- a/owasp-top10-2017-apps/a5/ecommerce-api/README.md +++ b/owasp-top10-2017-apps/a5/ecommerce-api/README.md @@ -11,7 +11,7 @@ Vulnerable Ecommerce API is a simple Golang web application that contains an exa - [Definition](#what-is-broken-access-control) - [Setup](#setup) - [Attack narrative](#attack-narrative) -- [Objectives](#secure-this-app-🔧) +- [Objectives](#secure-this-app) - [Solutions](#pr-solutions) - [Contributing](#contributing) @@ -101,7 +101,7 @@ curl -vvv http://localhost:8888/ticket/GUID

-## Secure this app 🔧 +## Secure this app How would you migitate this vulnerability? After your changes, an attacker should not be able to: