
The web client share details URL was vulnerable to a XSS attack. These vulnerabilities allow an unauthenticated attacker to dump user passwords in a cleartext form. SolarWinds would like to thank our Security Researchers below for reporting on this issue in a responsible manner and working with our security, product, and engineering teams to fix the vulnerability.
Serv u ftp server v6 1 password#
Minor logic issue with Argon2id password hashing implementation fixed.Ĭhange the password at next login users get "old Password is Wrong"Ĭorrectly when used in the Physical Path of a Virtual Path valueĮrror receiving file, transfer is abortedįor Serv-U 15.2.1 fixes, see the 15.2.1 Release Notes.įor Serv-U 15.2 fixes, see the 15.2 Release Notes. Issue resolved where anti-hammer counting regression led to memory leaks and 100%CPU consumption. Serv-U 15.2.2 fixes the following issues: Case Number Previous releasesįor earlier Serv-U releases, please visit the Previous Versions page. The administrator will be required to change their password. If an account is not used within 90 days of the upgrade, access is restricted and the user will not be able to log in afterward.
Serv u ftp server v6 1 upgrade#
If you upgrade from version 15.1.7 or older, 15.2.2 increases password security and automatically converts existing MD5 passwords using a more secure algorithm when users connect for the first time after upgrade. Serv-U 15.2.2 is signed with new code-signing certificate.To access this setting, navigate to the Limits and Settings screen for Global or Domain, and select Advanced from the Limit Type dropdown. Periodic buffer flush interval during SFTP file upload setting added to Limits:.

