Changes

Jump to navigation Jump to search
m
no edit summary
Line 9: Line 9:  
[[Category:Admin_en]]
 
[[Category:Admin_en]]
   −
= [[File:securite.png]] Alerts =
+
=[[File:securite.png]] Alerts=
 
Last update: {{REVISIONYEAR}}-{{REVISIONMONTH}}-{{REVISIONDAY}}
 
Last update: {{REVISIONYEAR}}-{{REVISIONMONTH}}-{{REVISIONDAY}}
    
Some SQL injections vulnerabilities have been reported. They are a small risk as they are in page that need to be logged to be used. Fix is available into 9.0.5.
 
Some SQL injections vulnerabilities have been reported. They are a small risk as they are in page that need to be logged to be used. Fix is available into 9.0.5.
Download from GitHub last [https://github.com/Dolibarr/dolibarr/archive/9.0.zip version 9] et la dernière [https://github.com/Dolibarr/dolibarr/archive/10.0.zip version 10]
     −
= [[File:art.png]] Features =
+
Download from GitHub last [https://github.com/Dolibarr/dolibarr/archive/9.0.zip version 9] et last [https://github.com/Dolibarr/dolibarr/archive/10.0.zip version 10]
 +
 
 +
=[[File:art.png]] Features=
 
Dolibarr implements several security features. Among them :
 
Dolibarr implements several security features. Among them :
    
'''Encryption'''
 
'''Encryption'''
* User passwords are encrypted in database <sup>[*7]</sup> <sup>[*8]</sup>.
+
 
* Database technical password can be obfuscated into the [[Configuration_file|Dolibarr configuration file]] (conf.php) <sup>[*8]</sup>.
+
*User passwords are encrypted in database <sup>[*7]</sup> <sup>[*8]</sup>.
* Possibility to force HTTPS <sup>[*9]</sup>.  
+
*Database technical password can be obfuscated into the [[Configuration_file|Dolibarr configuration file]] (conf.php) <sup>[*8]</sup>.
 +
*Possibility to force HTTPS <sup>[*9]</sup>.
 +
 
 
<source lang="php">
 
<source lang="php">
 
//conf/conf.php file
 
//conf/conf.php file
Line 28: Line 31:  
</source>
 
</source>
   −
{| class=wikitable style="width:100%;"
+
{| class="wikitable" style="width:100%;"
! scope="col"| Values
+
! scope="col" |Values
! scope="col"| Description
+
! scope="col" |Description
    
|-
 
|-
Line 53: Line 56:     
'''Hacks and cracks'''
 
'''Hacks and cracks'''
* Works with register_globals on or off (off highly recommended) <sup>[*2]</sup>.
+
 
* Works with PHP safe_mode on or off (on recommended) <sup>[*3]</sup>.
+
*Works with register_globals on or off (off highly recommended) <sup>[*2]</sup>.
* Production option to disable any technical information leakage like debug, error stacktrace, version informations (See [[Configuration_file|configuration file]]) <sup>[*6]</sup>.  
+
*Works with PHP safe_mode on or off (on recommended) <sup>[*3]</sup>.
* Protection against SQL injection <sup>[*2]</sup>.
+
*Production option to disable any technical information leakage like debug, error stacktrace, version informations (See [[Configuration_file|configuration file]]) <sup>[*6]</sup>.
* Protection against XSS injection (Cross Site Scripting) <sup>[*1]</sup>.
+
*Protection against SQL injection <sup>[*2]</sup>.
* Protection against CSRF (Cross Site Request Forgery) <sup>[*5]</sup>.
+
*Protection against XSS injection (Cross Site Scripting) <sup>[*1]</sup>.
 +
*Protection against CSRF (Cross Site Request Forgery) <sup>[*5]</sup>.
 +
 
 
Note that it is also recommanded to protect your web server by disabled Apache option
 
Note that it is also recommanded to protect your web server by disabled Apache option
 
<source lang="ini">
 
<source lang="ini">
Line 65: Line 70:     
'''Pages and files access'''
 
'''Pages and files access'''
* Pages and contents are protected by centralized entry code to check permissions (granted on groups or users for each functional module) <sup>[*4]</sup> <sup>[*10]</sup>.
+
 
* Files saved by Dolibarr are stored in a different root directory than web application (so they can't be downloaded without passing by the Dolibarr wrapper) <sup>[*3]</sup> <sup>[*10]</sup>.
+
*Pages and contents are protected by centralized entry code to check permissions (granted on groups or users for each functional module) <sup>[*4]</sup> <sup>[*10]</sup>.
* Dolibarr directories content can't be accessed even if Apache option Indexes has be forgotten to on (should not) <sup>[*3]</sup>.
+
*Files saved by Dolibarr are stored in a different root directory than web application (so they can't be downloaded without passing by the Dolibarr wrapper) <sup>[*3]</sup> <sup>[*10]</sup>.
 +
*Dolibarr directories content can't be accessed even if Apache option Indexes has be forgotten to on (should not) <sup>[*3]</sup>.
    
'''Login protection'''
 
'''Login protection'''
* Delay anti brute force cracking on login page <sup>[*7]</sup>.
+
 
* Option for graphical code (CAPTCHA) against robots on login page <sup>[*7]</sup>.
+
*Delay anti brute force cracking on login page <sup>[*7]</sup>.
* No passwords in logs, even in technical logs <sup>[*7]</sup>.
+
*Option for graphical code (CAPTCHA) against robots on login page <sup>[*7]</sup>.
* Internal logger to save permanently all Dolibarr events about user's administration and successful or failed logins or administration events (user or group or permission changes).
+
*No passwords in logs, even in technical logs <sup>[*7]</sup>.
 +
*Internal logger to save permanently all Dolibarr events about user's administration and successful or failed logins or administration events (user or group or permission changes).
    
'''Viruses'''
 
'''Viruses'''
* Possibility to run an external anti-virus on every uploaded files <sup>[*3]</sup>.
+
 
 +
*Possibility to run an external anti-virus on every uploaded files <sup>[*3]</sup>.
    
   
 
   
 
----
 
----
 
<sup>(*X)</sup> This solution is part of protection used to solve vulnerabilities classified by the [http://www.owasp.org/index.php/Top_10_2007 OWASP Top Ten] at range number X.
 
<sup>(*X)</sup> This solution is part of protection used to solve vulnerabilities classified by the [http://www.owasp.org/index.php/Top_10_2007 OWASP Top Ten] at range number X.
151

edits

Navigation menu