Ask the Community
Groups
Command injection exploit in the legacy UI php code - Connect IT Community | Kaseya
<main> <article class="userContent"> <h2 data-id="summary"><strong>SUMMARY</strong></h2> <p>A command injection exploit in the legacy UI php code was resolved in version 9.2</p> <h2 data-id="issue"><strong>ISSUE</strong></h2> <p>A command injection exploit in the legacy UI .php code was resolved in version 9.2. </p> <h2 data-id="resolution"><strong>RESOLUTION</strong></h2> <p>To resolve this issue, upgrade your appliance to version 9.2. </p> <h2 data-id="cause"><strong>CAUSE</strong></h2> <p>This exploit was caused by two factors: </p> <ol><li>A lack of authorization check on the update functionality.</li> <li>Improperly filtered input used as a command line parameter to yum. </li> </ol> </article> </main>