From 574e537ff17d643445f43ff1d0a8c6ba47e0e347 Mon Sep 17 00:00:00 2001 From: Ramon Novoa Date: Wed, 14 Nov 2018 12:16:59 +0100 Subject: [PATCH] Decode entities in the eHorus password. Ref pandora_enterprise#3073. --- pandora_console/operation/agentes/ehorus.php | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/pandora_console/operation/agentes/ehorus.php b/pandora_console/operation/agentes/ehorus.php index ddb1ca7db2..66a6a778cd 100644 --- a/pandora_console/operation/agentes/ehorus.php +++ b/pandora_console/operation/agentes/ehorus.php @@ -53,7 +53,7 @@ if (empty($ehorus_agent_id)) { $hostname = $config['ehorus_hostname']; $port = $config['ehorus_port']; $user = $config['ehorus_user']; -$password = io_output_password($config['ehorus_pass']); +$password = io_safe_output(io_output_password($config['ehorus_pass'])); $curl_timeout = $config['ehorus_req_timeout']; $base_url = 'https://' . $hostname . ':' . $port; @@ -315,4 +315,4 @@ $client_url = $config['homeurl'] . 'operation/agentes/ehorus_client.php?' . $que $('input#run-ehorus-client').click(handleButtonClick); }); - \ No newline at end of file +