Previous Topic

Next Topic

Book Contents

Book Index

Fixed Issues

The following issues were fixed in MOVEit Automation 2019.1.

ID

Category

Fixed Issue

MICEN-7060

Scripts, Unicode

An error occurred when passing non-ASCII characters to a script via Task Parameters.

MICEN-7647

Web Admin

Closing a browser without logging out results in a session expired message when the browser is reopened and Web Admin is opened.

MICEN-6815

Server, Task-Advanced

Advanced task conditional statements using a matches operator with 260 characters or more on the left-hand side caused a crash.

MICEN-7651

Database

When using the Azure database in MOVEit Automation, a database transaction error is logged at first activity if the system was idle for one or more hours.

MICEN-7636

Task Logs

Task logs from deleted tasks remained on the system.

MICEN-7885

Web Admin

After upgrading Web Admin crashed if the config.xml was imported without a <Groups> section.

MICEN-7663

Database, Install Server

After repairing MOVEit Automation 2019.0, the MICStats Data Source returns an error when opened.

MICEN-7712

 

Exported AS2 tasks containing a public SSL certificate are imported into a clean system as containing a private SSL certificate, causing the task to break.

MICEN-7945

Server

A parameter error in error logging caused a server crash.

MICEN-7776

Hosts, Web Admin

Non-standard email address format accepted by the email host.

MICEN-7825

SSH

After upgrading from MOVEit Automation 8.1 to MOVEit Automation 2019, an SSH key that cannot connect returns an error, "No available encryption algorithms match with the server."

MICEN-7181

Failover, Web Admin

Inaccurate error message returned when a user logged on to an invalid server or node.

362932

Security

CVE-2020-12677. Fixed an application endpoint that failed to adequately sanitize malicious input which could allow an unauthenticated attacker to execute arbitrary code in a victim's browser. Upgrade to 2019.1.2 is recommended.

Version affected: 2019.1

Version fixed: 2019.1.2

Credit: Bridgewater Security Team