This is an automated email from the ASF dual-hosted git repository.
jleroux pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ofbiz-site.git
The following commit(s) were added to refs/heads/master by this push:
new e38649a Improved: security page small improvement
e38649a is described below
commit e38649a115329f5755671135b3d3bcf0b8b4fe57
Author: Jacques Le Roux <[email protected]>
AuthorDate: Mon Nov 17 09:08:36 2025 +0100
Improved: security page small improvement
---
security.html | 2 +-
template/page/security.tpl.php | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/security.html b/security.html
index 4ad8084..596741d 100644
--- a/security.html
+++ b/security.html
@@ -128,7 +128,7 @@
<p> </p>
<p><strong>All system privileges, including access to potentially
vulnerable operations, are granted to administrators</strong>.
Even if we assume that administrators don't attack
their own websites, it's essential to exercise extra care when granting
administrator privileges.
- Therefore, if a security breach occurs on the
administration page (webtools), it's generally not perceived as a problem. The
administrator holds the power.
+ Therefore, if a security breach occurs on the
administration page or component (webtools), it's generally not perceived as a
problem. The administrator holds the power.
Unless an ordinary user manages to overstep their
bounds and act beyond their authority.
So in the webtools page we only accept vulnerabilities
when using a not administrator credential.
</p>
diff --git a/template/page/security.tpl.php b/template/page/security.tpl.php
index 97d75a6..d8b9b04 100644
--- a/template/page/security.tpl.php
+++ b/template/page/security.tpl.php
@@ -29,7 +29,7 @@
<p> </p>
<p><strong>All system privileges, including access to potentially
vulnerable operations, are granted to administrators</strong>.
Even if we assume that administrators don't attack
their own websites, it's essential to exercise extra care when granting
administrator privileges.
- Therefore, if a security breach occurs on the
administration page (webtools), it's generally not perceived as a problem. The
administrator holds the power.
+ Therefore, if a security breach occurs on the
administration page or component (webtools), it's generally not perceived as a
problem. The administrator holds the power.
Unless an ordinary user manages to overstep their
bounds and act beyond their authority.
So in the webtools page we only accept vulnerabilities
when using a not administrator credential.
</p>