Summary | WebGUI - Web vulnerability and interface fixes |
Platform | Windows |
Category | bugfix |
Requires |
1712, 1670, 1650, 1645, 1570, 1549 1712, 1704, 1700, 1695, 1686, 1684, 1676, 1672, 1670, 1650, 1649, 1645, 1641, 1635, 1634, 1625, 1622, 1606, 1602, 1601, 1599, 1589, 1570, 1568, 1557, 1556, 1553, 1550, 1549, 1541, 1537, 1535, 1533, 1529, 1524, 1522, 1512, 1507, 1501, 1497, 1491, 1482, 1480, 1475, 1467, 1460 (incl. dependencies) |
Client Required Patch/es | |
Supersedes | 1587, 1523 |
Superseded by | |
Affects | Server: Core |
Last Updated | March 2, 2022 |
This patch fixes: Vulnerability issues: * PHP version (Upgrade to 7.0.33) * Apache version (Upgrade to 2.4.41) * OpenSSL version (Upgrade to 1.1.1c) Web Interface issues: * Outdated client info in the dashboard * Login Page still accessible after log out * Error when updating web GUI database * Template selection filtering * Concatenated token pool and feature name in Feature Expiry page Note: Issues on General configuration will be encountered using patch bundle due to patch 1501 and 1553. Settings are reset to default value. (RM23040)
This patch updates Validation.php to allow dot (.) in LDAP path value.
This patch fixes: - issue wherein the last date in the exported excel sheet from chart reports has empty value. - inability to export chart-type Excel reports from table-type reports with special characters. - searching of classification values in Complete Selection. - sorting of Clients using "Last Seen" in System Info (6.5.x only). PHP files were updated.
Unpack the zip file anywhere on the machine to patch. Run install.exe to start the installation. Once the patch has been installed, you may delete the unpacked directory. NOTE: The patch must be installed by a user with administrator rights.