Changes

m
no edit summary
Line 13: Line 13:     
A vulnerability allowing a user to get the list of contacts (name, firstname and id in database) has been discovered.  
 
A vulnerability allowing a user to get the list of contacts (name, firstname and id in database) has been discovered.  
Fix is available into {{Template:SafeVersion}}.
+
Fix is available into {{Template:SafeVersion}}and higher versions.
    
Note: You can also download from GitHub the '''intermediate''' versions (not yet released maintenance package) for all branches/version (https://github.com/Dolibarr/dolibarr/)
 
Note: You can also download from GitHub the '''intermediate''' versions (not yet released maintenance package) for all branches/version (https://github.com/Dolibarr/dolibarr/)
Line 29: Line 29:  
*Possibility to force HTTPS <sup>[*9]</sup>.
 
*Possibility to force HTTPS <sup>[*9]</sup>.
   −
<syntaxHighlight lang="php">
+
<syntaxhighlight lang="php">
 
//conf/conf.php file
 
//conf/conf.php file
 
//example of $dolibarr_main_force_https  configuration
 
//example of $dolibarr_main_force_https  configuration
 
$dolibarr_main_force_https = '1';//to force https
 
$dolibarr_main_force_https = '1';//to force https
</syntaxHighlight>
+
</syntaxhighlight>
    
{| class="wikitable" style="width:100%;"
 
{| class="wikitable" style="width:100%;"
Line 77: Line 77:     
Note that it is also recommended to protect your web server by disabled Apache option
 
Note that it is also recommended to protect your web server by disabled Apache option
<syntaxHighlight lang="ini">
+
<syntaxhighlight lang="ini">
 
AcceptPathInfo Off
 
AcceptPathInfo Off
</syntaxHighlight>
+
</syntaxhighlight>
      Line 96: Line 96:  
*No passwords in logs, even in technical logs <sup>[*7]</sup>.
 
*No passwords in logs, even in technical logs <sup>[*7]</sup>.
 
*Internal logger to save permanently all Dolibarr events about user's administration and successful or failed logins or administration events (user or group or permission changes).
 
*Internal logger to save permanently all Dolibarr events about user's administration and successful or failed logins or administration events (user or group or permission changes).
*Can output a log record into a log file (module Debug Log must be enabled with at least level 5-LOG_NOTICE on production server, higher on development server) after success or failed login attempt so you can add a fail2ban rule to lock brute force cracking. You can check record with syntax :  
+
*Can output a log record into a log file (module Debug Log must be enabled with at least level 5-LOG_NOTICE on production server, higher on development server) after success or failed login attempt so you can add a fail2ban rule to lock brute force cracking. You can check record with syntax :
 +
 
 
  "YYYY-MM-DD HH:MM:SS (ERROR|NOTICE|INFO|DEBUG)    IP functions_dolibarr::check_user_password_.* Authentication KO"
 
  "YYYY-MM-DD HH:MM:SS (ERROR|NOTICE|INFO|DEBUG)    IP functions_dolibarr::check_user_password_.* Authentication KO"
 
A list of fail2ban rules to add to your server is provided on chapter '''DOS and Brute force rate Mitigation''' later.
 
A list of fail2ban rules to add to your server is provided on chapter '''DOS and Brute force rate Mitigation''' later.
Line 126: Line 127:  
The project provide examples of some fail2ban rules to block brute force attempts or abusive access on login page, password forgotten page and on any public pages. See https://github.com/Dolibarr/dolibarr/tree/develop/dev/setup/fail2ban
 
The project provide examples of some fail2ban rules to block brute force attempts or abusive access on login page, password forgotten page and on any public pages. See https://github.com/Dolibarr/dolibarr/tree/develop/dev/setup/fail2ban
   −
=[[File:art.png]] Report a security vulnerability =
+
=[[File:art.png]] Report a security vulnerability=
    
*To report a vulnerability, see the file: https://github.com/Dolibarr/dolibarr/blob/develop/SECURITY.md
 
*To report a vulnerability, see the file: https://github.com/Dolibarr/dolibarr/blob/develop/SECURITY.md
Line 132: Line 133:     
In most cases, security reports are processed in few days only.
 
In most cases, security reports are processed in few days only.
         
----
 
----
 
<sup>(*X)</sup> This solution is part of protection used to solve vulnerabilities classified by the [http://www.owasp.org/index.php/Top_10_2007 OWASP Top Ten] at range number X.
 
<sup>(*X)</sup> This solution is part of protection used to solve vulnerabilities classified by the [http://www.owasp.org/index.php/Top_10_2007 OWASP Top Ten] at range number X.