• last updated 14 hours ago
Constraints
Constraints: committers
 
Constraints: files
Constraints: dates
improved robstness when raw IP-V6 addresses are configured (rather than domain names)

backport from head

improved robstness when raw IP-V6 addresses are configured (rather than domain names)

bugfix(util_driver_info): reduce dependency on hardcoded driver names

- Avoid reliance on specific driver names (nsssl, nsudp, nsunix,

nsopenssl, nssocket) by falling back to generic "ns_driver info"

when available.

- Added explicit error message when "hostname" is missing on a network

driver module to prevent silent misconfiguration. This fixes a

potential infinite loop when OpenACS attempts to resolve the

"hostname" value.

This is a backport from the HEAD branch

bugfix(util_driver_info): reduce dependency on hardcoded driver names

- Avoid reliance on specific driver names (nsssl, nsudp, nsunix,

nsopenssl, nssocket) by falling back to generic "ns_driver info"

when available.

- Added explicit error message when "hostname" is missing on a network

driver module to prevent silent misconfiguration. This fixes a

potential infinite loop when OpenACS attempts to resolve the

"hostname" value.

added debugging hooks

improved clarity of the code and simplified structure

fix for using fallback interface and wrong results for non TLS installation

Many thanks to Antonio for flagging this and provide insights

bumped version number to allow packages to use mutiple tags from jsdelivr

::util::resources::cdnjs_get_newest_version: support cases, where multiple tags are returned

bumped version number to 6.0.0d4

added support for jsdelivr, since cdnjs misses many new releases

backport from HEAD

fix for "security::get_secure_qualified_url" when no an old-style servername is used

don't raise an exception, when invalid host header field is provided

Since this happens often with introsion attempts, provide a security warning.

use "ns_log security" when available

cleared editor buffer

added: icanuse "ns_log security"

new feature: added database vulnerability checks to posture overview

Extended the /acs-admin/posture-overview page to include known CVEs

for both the database client library and the database server in

use. Previously, the overview displayed privacy and privilege analyses

and flagged vulnerable JavaScript libraries; it now also surfaces

database‐related vulnerabilities.

* Leverage the NaviServer–nsdbpg API to fetch and display client‐ and

server‐side version numbers

* Drive this feature via a database‐agnostic interface—only the nsdbpg

driver currently returns versions, but support for other databases

can be added by updating their drivers (no NaviServer core changes

required)

To use this new feature, use the latest NaviServer and nsdbpg releases.

Otherwise, the section "Database Vulnerability Check" won't appear.

  1. … 2 more files in changeset.
Fixed snyk vulnerability check (backport from HEAD)

Snyk page has changed, we have to switch the pattern we are looking for.

Bumped version number to flage the change to "upgrade from repository"

Fixed snyk vulnerability check

Snyk page has changed, we have to switch the pattern we are looking for.

Do not modify posted form data when logging the request. In addition mask log output for all fields having password in their name

Enhanced security logging and debugging in security-procs.tcl

- Updated the internal log procedure to accept multiple arguments (using join) for more flexible logging.

- Replace several ns_log calls with ::security::log to standardize logging of session_id, login_cookie, timeout, and other events.

- Add additional log statements in critical functions (e.g. sec_handler, sec_setup_session, __ad_verify_signature, and CSRF token handling)

to provide better traceability of session allocation, cookie generation, session invalidation, and signature verification.

- Improve debug output for CSRF token generation and verification, including logging differences in computed hash values.

added debugging hook for tracing CSRF livecyle

improved log messages to pinpoint location and reason

  1. … 1 more file in changeset.
fixed variable name

provent passwords from form being logged via ad_log

ad_return_url: provide a positive list and a negative list for selecting included query variables

The new parameters follow the terminology of the "export_vars" command.

ad_return_url: new parameter "-exclude"

This change allows to exclude certain variables (which are e.g. considered as

confidential) from the form, which computes the return_url.

The change is based on a feature request in the OpenACS forums by Josue Cardona.

reapplied post 5-10 release fix

Many thanks to Claudio Pasolini for reporting and identifying the problem!

fixed bug security::validated_host_header

Many thanks to Claudio Pasolini for reporting and identifying the problem!