You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/update_and_migration/from_3.3/update_from_3.3.md
+6-8Lines changed: 6 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -446,13 +446,14 @@ No additional steps needed.
446
446
447
447
#### Security
448
448
449
-
This release contains security changes.
450
-
For each of the following advisories, evaluate the vulnerability to determine whether you might have been affected.
449
+
This release contains security fixes.
450
+
For more information, see [the published security advisory](https://developers.ibexa.co/security-advisories/ibexa-sa-2024-006-vulnerabilities-in-content-name-pattern-commerce-shop-and-varnish-vhost-templates).
451
+
For each of the following fixes, evaluate the vulnerability to determine whether you might have been affected.
451
452
If so, take appropriate action, for example by [revoking passwords](https://doc.ibexa.co/en/latest/users/passwords/#revoking-passwords) for all affected users.
452
453
453
454
##### <abbrtitle="Browser Reconnaissance & Exfiltration via Adaptive Compression of Hypertext">BREACH</abbr> vulnerability
454
455
455
-
[The BREACH attack](https://www.breachattack.com/) is a security vulnerability against HTTPS when using HTTP compression.
456
+
The [BREACH](https://www.breachattack.com/) attack is a security vulnerability against HTTPS when using HTTP compression.
456
457
457
458
If you're using Varnish, update the VCL configuration to stop compressing both the [[= product_name =]]'s REST API and JSON responses from your backend.
458
459
Fastly users are not affected.
@@ -481,12 +482,9 @@ Fastly users are not affected.
481
482
If you're not using a reverse proxy like Varnish or Fastly, adjust the compressed Content Type in the web server configuration.
482
483
For more information. see the [updated Apache and nginx template configuration](https://github.com/ibexa/post-install/pull/86/files).
483
484
484
-
For more information about the vulnerability, see the security advisory[TODO: insert link].
485
-
486
485
##### Outdated version of jQuery in ibexa/ezcommerce-shop package
487
486
488
487
There are no additional update steps to execute.
489
-
For more information, see the security advisory[TODO: insert link].
490
488
491
489
#### Other changes
492
490
@@ -509,9 +507,9 @@ You can customize the behavior of the command with the following options:
509
507
-`--max-iterations` or `-i` - maximum iterations count. Default value = -1 (unlimited).
510
508
-`--sleep` or `-s` - wait time between iterations, in milliseconds. Default value = 0.
511
509
512
-
##### Update webserver configuration
510
+
##### Update web server configuration
513
511
514
-
Adjust the webserver configuration to prevent direct access to the `index.php` file when using URLs consisting of multiple path segments.
512
+
Adjust the web server configuration to prevent direct access to the `index.php` file when using URLs consisting of multiple path segments.
515
513
516
514
See [the updated Apache and nginx template files](https://github.com/ibexa/post-install/pull/70/files) for more information.
Copy file name to clipboardExpand all lines: docs/update_and_migration/from_4.6/update_from_4.6.md
+7-12Lines changed: 7 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -168,15 +168,14 @@ You can customize the behavior of the command with the following options:
168
168
169
169
### Security
170
170
171
-
This release contains security changes.
172
-
For each of following advisories evaluate the vulnerability to determine whether you might have been affected.
171
+
This release contains security fixes.
172
+
For more information, see [the published security advisory](https://developers.ibexa.co/security-advisories/ibexa-sa-2024-006-vulnerabilities-in-content-name-pattern-commerce-shop-and-varnish-vhost-templates).
173
+
For each of the following fixes, evaluate the vulnerability to determine whether you might have been affected.
173
174
If so, take appropriate action, for example by [revoking passwords](https://doc.ibexa.co/en/latest/users/passwords/#revoking-passwords) for all affected users.
174
175
175
-
You can find the three advisories below:
176
-
177
176
#### <abbr title="Browser Reconnaissance & Exfiltration via Adaptive Compression of Hypertext">BREACH</abbr> vulnerability
178
177
179
-
[The BREACH attack](https://www.breachattack.com/) is a security vulnerability against HTTPS when using HTTP compression.
178
+
The [BREACH](https://www.breachattack.com/) attack is a security vulnerability against HTTPS when using HTTP compression.
180
179
181
180
If you're using Varnish, update the VCL configuration to stop compressing both the [[= product_name =]]'s REST API and JSON responses from your backend.
182
181
Fastly users are not affected.
@@ -202,21 +201,17 @@ Fastly users are not affected.
202
201
Update your Varnish VCL file to align it with the [`vendor/ibexa/http-cache/docs/varnish/vcl/varnish7.vcl`](https://github.com/ibexa/http-cache//blob/4.6/docs/varnish/vcl/varnish7.vcl) file.
203
202
```
204
203
205
-
If you're not using a reverse proxy like Varnish or Fastly, adjust the compressed Content Type in the webserver configuration.
204
+
If you're not using a reverse proxy like Varnish or Fastly, adjust the compressed Content Type in the web server configuration.
206
205
For more information. see the [updated Apache and nginx template configuration](https://github.com/ibexa/post-install/pull/86/files).
207
206
208
-
For more information, see the security advisory[TODO: insert link].
209
-
210
207
#### XSS in Content name pattern
211
208
212
209
There are no additional update steps to execute.
213
-
For more information, see the security advisory[TODO: insert link].
214
210
215
211
#### Outdated version of jQuery in ibexa/ezcommerce-shop package
216
212
217
213
Only users of the [old Commerce solution](update_from_4.3_old_commerce.md) are affected.
218
214
There are no additional update steps to execute.
219
-
For more information, see the security advisory[TODO: insert link].
0 commit comments