xymon web interface has looping redirect on criticaleditor.sh

Bug #1730738 reported by Phil Clifford
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
xymon (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

Description: Ubuntu 16.04.3 LTS
Release: 16.04

xymon:
  Installed: 4.3.25-1
  Candidate: 4.3.25-1
  Version table:
 *** 4.3.25-1 500
        500 http://gb.archive.ubuntu.com/ubuntu xenial/universe amd64 Packages
        100 /var/lib/dpkg/status

If you select the Web UI menu item Administration/Edit Critical Systems
https://<xymon host>/xymon-seccgi/criticaleditor.sh
you get a 500 error from apache and the Apache error log shows

[...] Disallowed request due to unexpected referer '<xymon host>/xymon/', wanted '<xymon host>/xymon-seccgi/criticaleditor' (originally '/xymon-seccgi/criticaleditor')
[...] [client x.w.y.z:50417] AH00124: Request exceeded the limit of 10 internal redirects due to probable configuration error.

This and some other bugs that are fixed upstream make significant parts of xymon unusable on the LTS version but according to the Changes file are fixed in the latest version (which is in zesty and artful). It would obviously be preferable to users to get the xymon web interface working on the current LTS rather than wait for bionic or move to non-LTS for this kind of service. Might be a good candidate for a snappy solution though...

Revision history for this message
Axel Beckert (xtaran) wrote :

This should be already fixed in 4.3.26-2 (and upstream in 4.3.27):

xymon (4.3.26-2) unstable; urgency=high

  * Apply upstream-suggested patch for multiple CGI related regressions in
    4.3.26.

 -- Axel Beckert <email address hidden> Fri, 04 Mar 2016 16:01:20 +0100

Revision history for this message
Axel Beckert (xtaran) wrote :

A fixed version is already present in e.g. zesty.

Changed in xymon (Ubuntu):
status: New → Fix Released
Revision history for this message
Axel Beckert (xtaran) wrote :

Someone from Ubuntu might want to cherry-pick that patch from 4.3.26-2 into 4.3.25-1 from 16.04 LTS. But IIRC that needs some changes/flags to this bug report I can't do.

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.