This is an automated email from the ASF dual-hosted git repository.

jleroux pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ofbiz-site.git


The following commit(s) were added to refs/heads/master by this push:
     new 44bb687  Improved: about themes/common-theme/webapp/images/products 
subdirectories
44bb687 is described below

commit 44bb687c926a52e0f2ffa26a5af8531284cdb0ab
Author: Jacques Le Roux <[email protected]>
AuthorDate: Sun Sep 28 18:08:43 2025 +0200

    Improved: about themes/common-theme/webapp/images/products subdirectories
    
    Separates "OFBiz Security" from "Security Vulnerabilities" chapters
---
 security.html                  | 4 ++--
 template/page/security.tpl.php | 4 ++--
 2 files changed, 4 insertions(+), 4 deletions(-)

diff --git a/security.html b/security.html
index 46eff2c..d3f49d2 100644
--- a/security.html
+++ b/security.html
@@ -135,11 +135,11 @@
 
             <p><strong>At the UI level the OFBiz logs are protected and should 
not be vulnerable to exploits</strong>.
                  We though warn OFBiz users it's important that out of OFBiz 
UI level logs files remain restricted to their trusted users.
-                 Also we recommend to use the <strong>verbose level on 
production</strong> only when it's absolutely necessary.</p>
+                 Also we recommend to use the <strong>verbose level on 
production</strong> only when it's absolutely necessary.
                  Another case where access needs to be restricted to trusted 
users is inside subdirectories of themes/common-theme/webapp/images/products.
                  Specifically because images upload for products is possible 
in those places. Hence possible embedded webshells, even if OFBiz has a robust 
protection.
                  As recommended by OWASP, a solid solution is to move the 
products images upload to another domain.
-                 You may also simply prevent security issues by making these 
subdirectories non-executable.
+                 You may also simply prevent security issues by making these 
subdirectories non-executable.</p>
 
 
             <h2><a id="security"></a>Security Vulnerabilities</h2>
diff --git a/template/page/security.tpl.php b/template/page/security.tpl.php
index 104ab0b..1339286 100644
--- a/template/page/security.tpl.php
+++ b/template/page/security.tpl.php
@@ -36,11 +36,11 @@
 
             <p><strong>At the UI level the OFBiz logs are protected and should 
not be vulnerable to exploits</strong>.
                  We though warn OFBiz users it's important that out of OFBiz 
UI level logs files remain restricted to their trusted users.
-                 Also we recommend to use the <strong>verbose level on 
production</strong> only when it's absolutely necessary.</p>
+                 Also we recommend to use the <strong>verbose level on 
production</strong> only when it's absolutely necessary.
                  Another case where access needs to be restricted to trusted 
users is inside subdirectories of themes/common-theme/webapp/images/products.
                  Specifically because images upload for products is possible 
in those places. Hence possible embedded webshells, even if OFBiz has a robust 
protection.
                  As recommended by OWASP, a solid solution is to move the 
products images upload to another domain.
-                 You may also simply prevent security issues by making these 
subdirectories non-executable.
+                 You may also simply prevent security issues by making these 
subdirectories non-executable.</p>
 
 
             <h2><a id="security"></a>Security Vulnerabilities</h2>

Reply via email to