I noticed a Ticket#1201 mentioning some improvements against vulenrabilities.
If it helps, I had someone here take a look at what could be improved, and this is what he came up with:
- SQL injection attacks --> treated in ticket#1201
- XSS attacks --> treated in ticket#1201
- CSRF attacks --> maybe also included in ticket#1201 ?
- Restricting execution of uploaded files (e.g. php files)
- Encryption of transmitted logins/passwords
In any case, thanks for the coming improvements! (can't wait to see what V4 looks like, by the way... )
Security leaks have been fixed corresponding to some identified threats.
If you have some examples of leaks, please send then to This email address is being protected from spambots. You need JavaScript enabled to view it..
I'll check if they are all fixed in V4.0.
About restricting execution of uploaded files (e.g. php files), this leak can only be solved by configuration, corresponding to recommandations : setup files attachment directories (for attachments, documents) out of php scope.
Encryption of login/passwords : password is already encrypted.
Best way to straighten this is to set application in ssl (https).
En poursuivant votre navigation, vous acceptez le dépôt de cookies tiers destinés au bon fonctionnement et à la sécurisation du site (gestion de session, reCaptcha) et à une analyse statistique anonymisée des accès sur notre site (Google Analytics). Si vous vous inscrivez, les informations que vous fournirez ne seront jamais divulguées à un tiers sous quelque forme que ce soit. En savoir plus
Cookies settings
×
Functional Cookies
Ce site utilise des cookies pour assurer son bon fonctionnement et ne peuvent pas être désactivés de nos systèmes. Nous ne les utilisons pas à des fins publicitaires. Si ces cookies sont bloqués, certaines parties du site ne pourront pas fonctionner.
Session
Please login to see yours activities!
Other cookies
Ce site web utilise un certain nombre de cookies pour gérer, par exemple, les sessions utilisateurs.