Skip to content

Commit 0322d98

Browse files
committed
Review: added BREACH explanantion and mentioned another webserver template change
1 parent d4a5fb9 commit 0322d98

File tree

2 files changed

+20
-3
lines changed

2 files changed

+20
-3
lines changed

docs/update_and_migration/from_3.3/update_from_3.3.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -452,7 +452,9 @@ If so, take appropriate action, for example by [revoking passwords](https://doc.
452452

453453
You can find the two advisories below:
454454

455-
##### BREACH attack
455+
##### <abbr title="Browser Reconnaissance & Exfiltration via Adaptive Compression of Hypertext">BREACH</abbr> vulnerability
456+
457+
[The BREACH attack](https://www.breachattack.com/) is a security vulnerability against HTTPS when using HTTP compression.
456458

457459
If you're using Varnish, update the VCL configuration to stop compressing both the [[= product_name =]]'s REST API and JSON responses from your backend.
458460
Fastly users are not affected.
@@ -508,6 +510,13 @@ You can customize the behavior of the command with the following options:
508510
- `--max-iterations` or `-i` - max. iterations count (default or -1: unlimited). Default value = -1.
509511
- `--sleep` or `-s` - wait time between iterations, in milliseconds. Default value = 0.
510512

513+
##### Update webserver configuration
514+
515+
Adjust the webserver configuration to prevent direct access to the `index.php` file when using URLs consisting of multiple path segments.
516+
517+
See [the updated Apache and nginx template files](https://github.com/ibexa/post-install/pull/70/files) for more information.
518+
519+
511520
## Finish the update
512521

513522
[[% include 'snippets/update/finish_the_update.md' %]]

docs/update_and_migration/from_4.6/update_from_4.6.md

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -174,7 +174,9 @@ If so, take appropriate action, for example by [revoking passwords](https://doc.
174174

175175
You can find the three advisories below:
176176

177-
#### BREACH attack
177+
#### <abbr title="Browser Reconnaissance & Exfiltration via Adaptive Compression of Hypertext">BREACH</abbr> vulnerability
178+
179+
[The BREACH attack](https://www.breachattack.com/) is a security vulnerability against HTTPS when using HTTP compression.
178180

179181
If you're using Varnish, update the VCL configuration to stop compressing both the [[= product_name =]]'s REST API and JSON responses from your backend.
180182
Fastly users are not affected.
@@ -216,7 +218,7 @@ Only users of the [old Commerce solution](update_from_4.3_old_commerce.md) are a
216218
There are no additional update steps to execute.
217219
For more information, see the security advisory[TODO: insert link].
218220

219-
#### Other changes
221+
### Other changes
220222

221223
#### Disable translations of identifiers in Product Catalog's categories
222224

@@ -228,3 +230,9 @@ Disable it by running the following migration:
228230
php bin/console ibexa:migrations:import vendor/ibexa/product-catalog/src/bundle/Resources/migrations/2024_07_25_07_00_non_translatable_product_categories.yaml --name=2024_07_25_07_00_non_translatable_product_categories.yaml
229231
php bin/console ibexa:migrations:migrate --file=2024_07_25_07_00_non_translatable_product_categories.yaml
230232
```
233+
234+
#### Update webserver configuration
235+
236+
Adjust the webserver configuration to prevent direct access to the `index.php` file when using URLs consisting of multiple path segments.
237+
238+
See [the updated Apache and nginx template files](https://github.com/ibexa/post-install/pull/70/files) for more information.

0 commit comments

Comments
 (0)