...
See the latest changes in version 5.10.05.
Compatible applications
Application | Compatible from version |
---|---|
Bamboo | 7.1.0 Server, 8.0.0 Data Center |
Bitbucket | 7.5.0 |
Confluence | 7.4.0 |
Jira | 8.11.0 |
...
13:30 CET
Beta feature: copy Copy users from one user directory to another
...
New function to copy users and their group and group memberships between user directories. This function is powerful, and can copy users even if a directory is inactive. This way the users can be copied first, and then when ready, the new user directory can be promoted with all the users ready to go.Status title Global
This can be used in many migration situations where you need users and their group memberships to be avaliable in another user directory than earlier. For instance it can be used when phasing out using active directory and introducing Just-in-time provisioning to internal directory, or when phasing out just-in-time provisioning and introducing cloud user synchronization from SCIM.
Changes in 5.10.1
15:00 CET
Bug fixes in OIDC & SAML test page and timing issue in WebServer Test.
Bug fixes
Bug fixes and stability on OIDC and SAML test pages. Had inconsistencies when custom username attribute was selected or change, and bad error handling for when a custom username attribute was not foundStatus colour Red title OIDC/SAML
Fix timing issue for triggering the header size probe in the Web Server Test in KerberosStatus colour Yellow title kerberos
Changes in 5.10.2
16:00 CET
Bugs fixes in SCIM, OIDC/SAML wizard and Username from header
Improvements
Made visual improvement to input fields and updated the SCIM setup wizard description for Azure ADStatus colour Green title SCim
Bug fixes
Fix incorrect URL to Azure AD in setup wizardStatus colour Red title OIDC/SAML
Fix issue with duplicated group memberships crashing the scim sync. Now unique lists of group memberships lessens the failure ratio.Status colour Green title SCim
Fix JSM signup-email from http header not working as intended due to timing issues with loading of DOM elementsStatus title username from header Changes in 5.10.2
16:00 CET
Bugs fixes in SCIM, OIDC/SAML wizard and Username from header
Changes in 5.10.3
14:00 CET
Security Patch: stored XSS on group names and update npm library
Security patches
Stored XSS in Kantega SSO Enterprise via Group names lead attacker to elevate a privileged user account to System admin. When script injection is stored in group names under User Management > Groups, a Select / dropdown component used on theStatus title Stored xss via group names
“Group Memberships” page,Status colour Red title oidc/saml
“Disable traditional username/password login” page andStatus colour Green title common
“Disable Kerberos for some users ” page was susceptible to stored XSS. The vulnerability is considered of low severity, since the attacker already would need to have administrative access to the system.Status colour Blue title kerberos
Thanks to Bug Bounty researcher UpdateLap for discovering this vulnerability.Patch CVE-2022-25858 found in the webpack terser plugin
Changes in 5.10.4
11:30 CET
Bugfix backup of config in Windows and other improvements
Bug fixes
A change introduced in version 5.7 of Kantega SSO Enterprise made a subtle change to file handling, which broke the creation of a backup of config file on Windows servers, because of a file lock that occured only in Windows, and passed by undiscovered in Unix-based QA.Status title Backup & restore
Improvements
The Debug info text in the Support tab now contains information from the latest OIDC/SAML test logins, and such gives a more complete image of the instance without having to send several fragments from test pages in addition to the global Debug info text.Status colour Red title support debug information
Fix debug log statement which had an inverted reasoning for blocking a requestStatus colour Yellow title api tokens
Changes in 5.10.5
16:00 CET
Improvements to fallback redirect and default parameters
Improvements
Setting up Azure AD with OIDC will now have populated default parameters for name and email .Status colour Red title Azure ad OIDC
AddedStatus colour Yellow title saml/oidc login_hint
to the redirect when FALLBACK is chosen as redirect mode.