aboutsummaryrefslogtreecommitdiffstats
path: root/docs/_posts/2015-07-10-v1.5.5.md
diff options
context:
space:
mode:
Diffstat (limited to 'docs/_posts/2015-07-10-v1.5.5.md')
-rw-r--r--docs/_posts/2015-07-10-v1.5.5.md50
1 files changed, 50 insertions, 0 deletions
diff --git a/docs/_posts/2015-07-10-v1.5.5.md b/docs/_posts/2015-07-10-v1.5.5.md
new file mode 100644
index 000000000..b82c55738
--- /dev/null
+++ b/docs/_posts/2015-07-10-v1.5.5.md
@@ -0,0 +1,50 @@
+---
+layout: post
+title: Version 1.6
+author: matthew
+---
+
+<div class="r" align="right">
+<a data-flickr-embed="true" href="https://www.flickr.com/photos/caffeina/2079673826/" title="security"><img src="https://farm3.staticflickr.com/2065/2079673826_c4edb07e4d.jpg" width="500" height="333" alt="security"></a><script async src="//embedr.flickr.com/assets/client-code.js" charset="utf-8"></script>
+</div>
+
+We’ve released **version 1.6** of FixMyStreet (previously numbered 1.5.5).
+
+This release includes important security fixes:
+
+* A vulnerability in login email sending that could allow an account to
+ be hijacked by a third party;
+* Alterations to token logging in and timeout behaviour;
+* A dependency update to fix an issue with Unicode characters in passwords.
+
+More details on those items below. Other items in this release include a
+Chinese translation, a bug fix with shrunken update photos, and some front end
+improvements, such as a ‘hamburger’ menu icon and an easier Report button on
+mobile, and resized map pins based on zoom level.
+
+See the full list of changes
+[over on GitHub](https://github.com/mysociety/fixmystreet/releases).
+
+Security fixes
+--------------
+
+**Login email account hijacking:**
+Due to the way parameters were passed into the token table in the database, it
+was possible for someone to request a login email for one email address, but
+have the login email sent to different address. This would allow a third party
+to log in as someone else, letting them make reports or updates as that person.
+
+The code has been rewritten so all user parameter passing goes through central
+functions that return only one parameter even if the user has passed multiple
+parameters. [More details of this class of vulnerability](http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/).
+
+**Email authentication tokens:**
+Problem confirmation tokens had to be used within a month; this now applies to
+all confirmation tokens, and email sign in tokens are valid for a day. Using
+those tokens after confirmation will redirect correctly, but no longer log you
+in; links in alert emails will no longer log you in.
+
+**Unicode characters in passwords:**
+The package our code uses to encode database columns,
+DBIx::Class::EncodedColumn, could have issues with Unicode characters provided
+to it. This was fixed by upgrading the version we use.