May I know if backdrop vulnerable to the Log4shell/Log4j (CVE-2021-44228) in any stage or version or third party plugin found vulnerable to this ? Is there any official statement from backdrop on this ? I need a firm answer on this. Thanks.
Backdrop is definitely not vulnerable because of Log4j. Log4j is a Java component; Backdrop doesn't directly use Java, it's written in PHP, HTML, and JavaScript, with a smattering of scripting languages and configurations.
Note: I don't speak officially for Backdrop, but I'm pretty confident about this.
Hi @Gnome and welcome to Backdrop
When I create custom layout templates I put them in /layouts/custom/my_layout
Note: you can split modules and layouts between contrib and custom...
Posted3 days 12 hours ago by Martin Price | System Horizons Ltd (yorkshirepudding) on:
This post explains how to do this in Drupal 7. In Backdrop, File Entity is already part of core. You will need to download and install module Views Field View.
https://drupal.stackexchange...
Posted4 days 20 hours ago by Alejandro Cremaschi (argiepiano) on:
After alot of trials, i have done the obvious and translated the whole block for different languages with each property condition as follows:
->propertyCondition('langcode', 'en...
Thanks so much! It's working now:
I was able to transfer the docroot files to the containing directory without the need for a second database or any manual configuration export/import/sync...
Comments
Backdrop is definitely not vulnerable because of Log4j. Log4j is a Java component; Backdrop doesn't directly use Java, it's written in PHP, HTML, and JavaScript, with a smattering of scripting languages and configurations.
Note: I don't speak officially for Backdrop, but I'm pretty confident about this.
I'm glad to hear this. Thanks for your affirmation.