This is an automated email from the ASF dual-hosted git repository.

jleroux pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/ofbiz-site.git


The following commit(s) were added to refs/heads/master by this push:
     new e38649a  Improved: security page small improvement
e38649a is described below

commit e38649a115329f5755671135b3d3bcf0b8b4fe57
Author: Jacques Le Roux <[email protected]>
AuthorDate: Mon Nov 17 09:08:36 2025 +0100

    Improved: security page small improvement
---
 security.html                  | 2 +-
 template/page/security.tpl.php | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/security.html b/security.html
index 4ad8084..596741d 100644
--- a/security.html
+++ b/security.html
@@ -128,7 +128,7 @@
             <p> </p>
             <p><strong>All system privileges, including access to potentially 
vulnerable operations, are granted to administrators</strong>.
                        Even if we assume that administrators don't attack 
their own websites, it's essential to exercise extra care when granting 
administrator privileges.
-                       Therefore, if a security breach occurs on the 
administration page (webtools), it's generally not perceived as a problem. The 
administrator holds the power.
+                       Therefore, if a security breach occurs on the 
administration page or component (webtools), it's generally not perceived as a 
problem. The administrator holds the power.
                        Unless an ordinary user manages to overstep their 
bounds and act beyond their authority.
                        So in the webtools page we only accept vulnerabilities 
when using a not administrator credential.
             </p>
diff --git a/template/page/security.tpl.php b/template/page/security.tpl.php
index 97d75a6..d8b9b04 100644
--- a/template/page/security.tpl.php
+++ b/template/page/security.tpl.php
@@ -29,7 +29,7 @@
             <p> </p>
             <p><strong>All system privileges, including access to potentially 
vulnerable operations, are granted to administrators</strong>.
                        Even if we assume that administrators don't attack 
their own websites, it's essential to exercise extra care when granting 
administrator privileges.
-                       Therefore, if a security breach occurs on the 
administration page (webtools), it's generally not perceived as a problem. The 
administrator holds the power.
+                       Therefore, if a security breach occurs on the 
administration page or component (webtools), it's generally not perceived as a 
problem. The administrator holds the power.
                        Unless an ordinary user manages to overstep their 
bounds and act beyond their authority.
                        So in the webtools page we only accept vulnerabilities 
when using a not administrator credential.
             </p>

Reply via email to