bzp2010 commented on a change in pull request #880:
URL: https://github.com/apache/apisix-website/pull/880#discussion_r805465482



##########
File path: website/blog/2022/02/11/cve-2022-24112.md
##########
@@ -1,15 +1,15 @@
 ---
-title: "Apache APISIX Risk Notice for Rewriting X-REAL-IP Header 
(CVE-2022-24112)"
+title: "Apache APISIX Vulnerability for Rewriting X-REAL-IP Header 
(CVE-2022-24112)"
 keywords: 
-- Risk Notice
+- Vulnerability
 - Header
 - IP restrictions
 - CHAITIN
 description: In versions prior to Apache APISIX 2.12.1, there is a risk of 
rewriting X-REAL-IP header after enabling the Apache APISIX `batch- requests` 
plug-in. Now the processing information will be announced.
 tags: [Security]
 ---
 
-> In versions prior to Apache APISIX 2.12.1, there is a risk of rewriting 
X-REAL-IP header after enabling the Apache APISIX `batch- requests` plug-in. 
Now the processing information will be announced.
+> In versions prior to Apache APISIX 2.12.1, there is a risk of rewriting 
X-REAL-IP header after enabling the Apache APISIX `batch-requests` plug-in. Now 
the processing information will be announced.

Review comment:
       ```suggestion
   > In versions prior to Apache APISIX 2.12.1, there is a risk of rewriting 
X-REAL-IP header after enabling the Apache APISIX `batch-requests` plugin. Now 
the processing information will be announced.
   ```
   
   In many other documents, we use plugin, not plug-in.




-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to