Koha/koha-tmpl/opac-tmpl/bootstrap/en
Tomas Cohen Arazi 6fba85d23b Bug 29924: Avoid leaking information on wrong credentials
If the passed credentials are wrong, we shouldn't expose things like the
password is expired.

This patch takes care of that.

To test:
1. Have a known patron with password_expiration_date set so its
   password is expired. Can be done like:
   $ koha-mysql kohadev
   > UPDATE borrowers \
     SET password_expiration_date='2022-04-25' \
     WHERE borrowernumber=132;
   Note: change the borrowernumber
2. Attempt to login to the OPAC with wrong credentials
=> SUCCESS: You are rejected, with a message telling credentials are
            wrong
=> FAIL: You are told the password is expired.
3. Apply this patch and restart Plack
4. Repeat 2
=> SUCCESS: You are rejected, credentials are wrong and no mention to
            password being expired.

Signed-off-by: Tomas Cohen Arazi <tomascohen@theke.io>
Signed-off-by: Fridolin Somers <fridolin.somers@biblibre.com>
2022-05-06 10:33:09 -10:00
..
includes Bug 30136: (follow-up) CSS and accessibility update 2022-04-27 11:20:45 -10:00
modules Bug 29924: Avoid leaking information on wrong credentials 2022-05-06 10:33:09 -10:00
xslt Bug 19532: (RM follow-up) Adapt also UNIMARC XSLT 2022-03-14 22:45:52 -10:00