This is an automated email from the ASF dual-hosted git repository. jleroux pushed a commit to branch master in repository https://gitbox.apache.org/repos/asf/ofbiz-site.git
The following commit(s) were added to refs/heads/master by this push: new 991a443 Improved: clarify the vocabulary used 991a443 is described below commit 991a443f740ae7adc996d1b1442f093eb4700051 Author: Jacques Le Roux <jacques.le.r...@les7arts.com> AuthorDate: Wed Aug 28 10:35:47 2024 +0200 Improved: clarify the vocabulary used Fixes mention about CSRF, pre-authN attacks are concerned not post-authN ones. This uses 2 links that help understand the vocabulary. I hope the 1st link will last... --- security.html | 10 +++++++++- template/page/security.tpl.php | 10 +++++++++- 2 files changed, 18 insertions(+), 2 deletions(-) diff --git a/security.html b/security.html index 0e5d546..7526b47 100644 --- a/security.html +++ b/security.html @@ -129,7 +129,15 @@ <a href="https://nightlies.apache.org/ofbiz/trunk/readme/html5/README.html#security" target="external"> we highly suggest to OFBiz users to not use credentials demo in production</a> and we expect OFBiz users to do so. <a href="https://cwiki.apache.org/confluence/display/OFBIZ/Keeping+OFBiz+secure" target="external"> We also warn our users on the "Keeping OFBiz secure wiki page".</a> - And finally, mostly we reject post-authN vulnerabilities because we have a solid CSRF defense.</p> + And we finally reject pre-authN vulnerabilities because we have a solid CSRF defense. + </p> + <p> + To clarify the vocabulary used above here are 2 links: + <ul class="iconsList"> + <li><i class="icon-pin"></i><a href="www.scmagazine.com/resource/what-are-post-authentication-attacks-and-how-to-protect-against-them">pre-authN vs post-authN</a></li> + <li><i class="icon-pin"></i><a href="cwe.mitre.org/data/definitions/863.html#ocimg_863_Alternate_Terms">authN vs authZ</a></li> + </ul> + </p> <h3>List of Known Vulnerabilities</h3> <ul class="iconsList"> diff --git a/template/page/security.tpl.php b/template/page/security.tpl.php index 02e3fd2..45e88a5 100644 --- a/template/page/security.tpl.php +++ b/template/page/security.tpl.php @@ -30,7 +30,15 @@ <a href="https://nightlies.apache.org/ofbiz/trunk/readme/html5/README.html#security" target="external"> we highly suggest to OFBiz users to not use credentials demo in production</a> and we expect OFBiz users to do so. <a href="https://cwiki.apache.org/confluence/display/OFBIZ/Keeping+OFBiz+secure" target="external"> We also warn our users on the "Keeping OFBiz secure wiki page".</a> - And finally, mostly we reject post-authN vulnerabilities because we have a solid CSRF defense.</p> + And we finally reject pre-authN vulnerabilities because we have a solid CSRF defense. + </p> + <p> + To clarify the vocabulary used above here are 2 links: + <ul class="iconsList"> + <li><i class="icon-pin"></i><a href="www.scmagazine.com/resource/what-are-post-authentication-attacks-and-how-to-protect-against-them">pre-authN vs post-authN</a></li> + <li><i class="icon-pin"></i><a href="cwe.mitre.org/data/definitions/863.html#ocimg_863_Alternate_Terms">authN vs authZ</a></li> + </ul> + </p> <h3>List of Known Vulnerabilities</h3> <ul class="iconsList">