So are you saying that if we remove the user/group from the cron it will re-introduce the security vulnerability?scottwilkerson wrote:Glad to hear that removing that resolved the issue, but frankly I don't know why it did. The addition of the user/group to the cron to for a security vulnerability, although upgrading the Wizard to the latest may also mitigate that as well for future runs.TBT wrote:Manually running without User and Group was successful. Timestamp on the files (/var/lib/mrtg) now reflects when ran. Also, the mrtg.lock file is present.
Additionally, we've modified the cron job, removing User and Group, allowing it to run as per schedule. Result was also successful as graphs are updating.
We still don't understand why this affects only 1 of the 9 XI Servers in our environment. Should we modify the cron on all servers and will the User/Group be removed from future XI releases?
We will not be removing the user/group in the future, if the wizards is updated on all server I would say it is ok to change the cron on all of them.
I'd like to figure this issue out, as it will be reoccurring in future XI updates. Further suggestions?