Re: Modification of mail templates

2017-07-13 Thread Maxim Solodovnik
Hello you can change HTML of email templates as described here: http://openmeetings.apache.org/EditTemplates.html The only limitation: you need to create more generic template, I'm afraid it would be impossible to create 3 URL as in your example On Thu, Jul 13, 2017 at 11:54 PM,

Re: help configuration smtp server

2017-07-13 Thread Maxim Solodovnik
To set up gmail smtp you should get params from here: https://support.google.com/a/answer/176600?hl=en I have used "Gmail SMTP server" In OM "mail.smtp.starttls.enable" should be "1" In case of "unable to find valid certification path to requested target" you most probably need to update JRE (to

Re: help configuration smtp server

2017-07-13 Thread Richard Pérez
Sorry about that, I thought that highlighting the exceptions would help you go through the whole code. Here are the different tests performed in summary with their corresponding exceptions: Apparently tuning Avast Off or ON and Chrome’s “Less Secure apps” Off or On has no effect, except with

Modification of mail templates

2017-07-13 Thread maxime . guerif
Hello, I have another request, After setting a conference request, a mail with default message and links in it is sent. Here is the default message: "If you have problems with the link, please copy and paste this to your browser: http://localhost:5080/openmeetings/#room/36; In fact, I

CVE-2017-7685 - Apache OpenMeetings - Insecure HTTP Methods

2017-07-13 Thread Maxim Solodovnik
Severity: Lowest Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings 1.0.0 Description: Apache OpenMeetingsrespond to the following insecure HTTP Methods: PUT, DELETE, HEAD, and PATCH. CVE-2017-7685 The issue was fixed in 3.3.0 All users are recommended to upgrade to

CVE-2017-7688 - Apache OpenMeetings - Insecure Password Update

2017-07-13 Thread Maxim Solodovnik
Severity: Low Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings 1.0.0 Description: Apache OpenMeetings updates user password in insecure manner. CVE-2017-7688 The issue was fixed in 3.3.0 All users are recommended to upgrade to Apache OpenMeetings 3.3.0 Credit:

CVE-2017-7684 - Apache OpenMeetings - Insecure File Upload

2017-07-13 Thread Maxim Solodovnik
Severity: Low Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings 1.0.0 Description: Apache OpenMeetings doesn't check contents of files being uploaded. An attacker can cause a denial of service by uploading multiple large files to the server CVE-2017-7684 The issue

CVE-2017-7683 - Apache OpenMeetings - Information Disclosure

2017-07-13 Thread Maxim Solodovnik
Severity: Lowest Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings 1.0.0 Description: Apache OpenMeetings displays Tomcat version and detailed error stack trace which is not secure. CVE-2017-7683 The issue was fixed in 3.3.0 All users are recommended to upgrade to

CVE-2017-7682 - Apache OpenMeetings - Business Logic Bypass

2017-07-13 Thread Maxim Solodovnik
Severity: Medium Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings 3.2.0 Description: Apache OpenMeetings is vulnerable to parameter manipulation attacks, as a result attacker has access to restricted areas. CVE-2017-7682 The issue was fixed in 3.3.0 All users are

CVE-2017-7681 - Apache OpenMeetings - SQL injection in web services

2017-07-13 Thread Maxim Solodovnik
Severity: High Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings 1.0.0 Description: Apache OpenMeetings is vulnerable to SQL injection This allows authenticated users to modify the structure of the existing query and leak the structure of other queries being made by

CVE-2017-7680 - Apache OpenMeetings - Insecure crossdomain.xml policy

2017-07-13 Thread Maxim Solodovnik
Severity: Low Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings 1.0.0 Description: Apache OpenMeetings has an overly permissive crossdomain.xml file. This allows for flash content to be loaded from untrusted domains. CVE-2017-7680 The issue was fixed in 3.3.0 All

CVE-2017-7673 - Apache OpenMeetings Insufficient check in dialogs with passwords

2017-07-13 Thread Maxim Solodovnik
Severity: High Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings 1.0.0 Description: Apache OpenMeetings uses not very strong cryptographic storage, captcha is not used in registration and forget password dialogs and auth forms missing brute force protection

CVE-2017-7666 - Apache OpenMeetings Missing Secure Headers

2017-07-13 Thread Maxim Solodovnik
Severity: High Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings 1.0.0 Description: Apache Openmeetings is vulnerable to Cross-Site Request Forgery (CSRF) attacks, XSS attacks, click-jacking, and MIME based attacks CVE-2017-7666 The issue was fixed in 3.3.0 All

CVE-2017-7664 - Apache OpenMeetings - Missing XML Validation

2017-07-13 Thread Maxim Solodovnik
Severity: High Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings 3.1.0 Description: Uploaded XML documents were not correctly validated CVE-2017-7664 The issue was fixed in 3.3.0 All users are recommended to upgrade to Apache OpenMeetings 3.3.0 Credit: This issue

CVE-2017-7663 - Apache OpenMeetings - XSS in chat

2017-07-13 Thread Maxim Solodovnik
Severity: High Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings 3.2.0 Description: Both global and Room chat are vulnerable to XSS attack CVE-2017-7663 The issue was fixed in 3.3.0 All users are recommended to upgrade to Apache OpenMeetings 3.3.0 Credit: This

[ANNOUNCE] Apache OpenMeetings 3.3.0 released

2017-07-13 Thread Maxim Solodovnik
The Apache Openmeetings project is pleased to announce the release of Apache Openmeetings 3.3.0. The release is available for download from http://openmeetings.apache.org/downloads.html Apache OpenMeetings provides video conferencing, instant messaging, white board, collaborative document editing

Re: help configuration smtp server

2017-07-13 Thread Maxim Solodovnik
To be fair, I don't have enough time to read through 209 pages. Could you please send email, find error in the log and paste it as text into email? Thanks in advance On Thu, Jul 13, 2017 at 10:50 PM, Richard Pérez wrote: > Here I send attached as PDFs Openmeetings

Re: help configuration smtp server

2017-07-13 Thread Maxim Solodovnik
Please provide related part of openmeetings.log? What the exact error are you receiving from java.mail? On Thu, Jul 13, 2017 at 9:37 PM, Richard Pérez wrote: > Hello: > > I was "listening" in to this one because I'm suffering the same inability > to send emails, > I

Re: help configuration smtp server

2017-07-13 Thread Richard Pérez
Hello: I was "listening" in to this one because I'm suffering the same inability to send emails, I get the same error messages. I have tried with yahoo, Gmail, Hotmail and my website's email, with my Antivirus disconnected or not, with Chrome's "less secure" active or not, with 465, 443, 587,

Re: help configuration smtp server

2017-07-13 Thread maxime . guerif
On 13.07.2017 02:58, Maxim Solodovnik wrote: > Hello, > > This error "unable to find valid certification path to requested target" > usually means certificate chin is not recognized to be secure > I believe you need to import your CA certificate will all intermediate > certificates to JRE

Re: OpenMeeting zoom in doc

2017-07-13 Thread Maxim Solodovnik
Please do not write direct emails. Unfortunately I can give no estimates so far, not enough free time :( On Thu, Jul 13, 2017 at 2:40 PM, Ganesh Singh wrote: > Hi Maxim, > > Just wanted to know when can i expect the zoom feature for doc,pdf etc > files in OM 4.0.0. > > If