Skip to content

Commit 49ca0b2

Browse files
committed
Applied review suggestions and added advisory links
1 parent d8823ff commit 49ca0b2

File tree

2 files changed

+13
-20
lines changed

2 files changed

+13
-20
lines changed

docs/update_and_migration/from_3.3/update_from_3.3.md

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -446,13 +446,14 @@ No additional steps needed.
446446

447447
#### Security
448448

449-
This release contains security changes.
450-
For each of the following advisories, evaluate the vulnerability to determine whether you might have been affected.
449+
This release contains security fixes.
450+
For more information, see [the published security advisory](https://developers.ibexa.co/security-advisories/ibexa-sa-2024-006-vulnerabilities-in-content-name-pattern-commerce-shop-and-varnish-vhost-templates).
451+
For each of the following fixes, evaluate the vulnerability to determine whether you might have been affected.
451452
If so, take appropriate action, for example by [revoking passwords](https://doc.ibexa.co/en/latest/users/passwords/#revoking-passwords) for all affected users.
452453

453454
##### <abbr title="Browser Reconnaissance & Exfiltration via Adaptive Compression of Hypertext">BREACH</abbr> vulnerability
454455

455-
[The BREACH attack](https://www.breachattack.com/) is a security vulnerability against HTTPS when using HTTP compression.
456+
The [BREACH](https://www.breachattack.com/) attack is a security vulnerability against HTTPS when using HTTP compression.
456457

457458
If you're using Varnish, update the VCL configuration to stop compressing both the [[= product_name =]]'s REST API and JSON responses from your backend.
458459
Fastly users are not affected.
@@ -481,12 +482,9 @@ Fastly users are not affected.
481482
If you're not using a reverse proxy like Varnish or Fastly, adjust the compressed Content Type in the web server configuration.
482483
For more information. see the [updated Apache and nginx template configuration](https://github.com/ibexa/post-install/pull/86/files).
483484

484-
For more information about the vulnerability, see the security advisory[TODO: insert link].
485-
486485
##### Outdated version of jQuery in ibexa/ezcommerce-shop package
487486

488487
There are no additional update steps to execute.
489-
For more information, see the security advisory[TODO: insert link].
490488

491489
#### Other changes
492490

@@ -509,9 +507,9 @@ You can customize the behavior of the command with the following options:
509507
- `--max-iterations` or `-i` - maximum iterations count. Default value = -1 (unlimited).
510508
- `--sleep` or `-s` - wait time between iterations, in milliseconds. Default value = 0.
511509

512-
##### Update webserver configuration
510+
##### Update web server configuration
513511

514-
Adjust the webserver configuration to prevent direct access to the `index.php` file when using URLs consisting of multiple path segments.
512+
Adjust the web server configuration to prevent direct access to the `index.php` file when using URLs consisting of multiple path segments.
515513

516514
See [the updated Apache and nginx template files](https://github.com/ibexa/post-install/pull/70/files) for more information.
517515

docs/update_and_migration/from_4.6/update_from_4.6.md

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -168,15 +168,14 @@ You can customize the behavior of the command with the following options:
168168

169169
### Security
170170

171-
This release contains security changes.
172-
For each of following advisories evaluate the vulnerability to determine whether you might have been affected.
171+
This release contains security fixes.
172+
For more information, see [the published security advisory](https://developers.ibexa.co/security-advisories/ibexa-sa-2024-006-vulnerabilities-in-content-name-pattern-commerce-shop-and-varnish-vhost-templates).
173+
For each of the following fixes, evaluate the vulnerability to determine whether you might have been affected.
173174
If so, take appropriate action, for example by [revoking passwords](https://doc.ibexa.co/en/latest/users/passwords/#revoking-passwords) for all affected users.
174175

175-
You can find the three advisories below:
176-
177176
#### <abbr title="Browser Reconnaissance & Exfiltration via Adaptive Compression of Hypertext">BREACH</abbr> vulnerability
178177

179-
[The BREACH attack](https://www.breachattack.com/) is a security vulnerability against HTTPS when using HTTP compression.
178+
The [BREACH](https://www.breachattack.com/) attack is a security vulnerability against HTTPS when using HTTP compression.
180179

181180
If you're using Varnish, update the VCL configuration to stop compressing both the [[= product_name =]]'s REST API and JSON responses from your backend.
182181
Fastly users are not affected.
@@ -202,21 +201,17 @@ Fastly users are not affected.
202201
Update your Varnish VCL file to align it with the [`vendor/ibexa/http-cache/docs/varnish/vcl/varnish7.vcl`](https://github.com/ibexa/http-cache//blob/4.6/docs/varnish/vcl/varnish7.vcl) file.
203202
```
204203

205-
If you're not using a reverse proxy like Varnish or Fastly, adjust the compressed Content Type in the webserver configuration.
204+
If you're not using a reverse proxy like Varnish or Fastly, adjust the compressed Content Type in the web server configuration.
206205
For more information. see the [updated Apache and nginx template configuration](https://github.com/ibexa/post-install/pull/86/files).
207206

208-
For more information, see the security advisory[TODO: insert link].
209-
210207
#### XSS in Content name pattern
211208

212209
There are no additional update steps to execute.
213-
For more information, see the security advisory[TODO: insert link].
214210

215211
#### Outdated version of jQuery in ibexa/ezcommerce-shop package
216212

217213
Only users of the [old Commerce solution](update_from_4.3_old_commerce.md) are affected.
218214
There are no additional update steps to execute.
219-
For more information, see the security advisory[TODO: insert link].
220215

221216
### Other changes
222217

@@ -231,8 +226,8 @@ php bin/console ibexa:migrations:import vendor/ibexa/product-catalog/src/bundle/
231226
php bin/console ibexa:migrations:migrate --file=2024_07_25_07_00_non_translatable_product_categories.yaml
232227
```
233228

234-
#### Update webserver configuration
229+
#### Update web server configuration
235230

236-
Adjust the webserver configuration to prevent direct access to the `index.php` file when using URLs consisting of multiple path segments.
231+
Adjust the web server configuration to prevent direct access to the `index.php` file when using URLs consisting of multiple path segments.
237232

238233
See [the updated Apache and nginx template files](https://github.com/ibexa/post-install/pull/70/files) for more information.

0 commit comments

Comments
 (0)