FileMaker, dylib hijacking

Understanding the Risks and Mitigations of dylib Hijacking in macOS FileMaker Pro CVE-2023-42920 Source: https://fm-security.com/posts/dylib/ CVE macOS FileMaker Pro CVE-2023-42920 Menu Introduction The dylib hijacking vulnerability for macOS is well known and studied. But from a FileMaker developer’s point of view, I have not seen any analysis of this problem. I will begin a little bit from afar. Embedding into someone else’s

The Missing Admin Tool for FileMaker Server with Claus Lavendt

Claus Lavendt, FileMaker Training Videos – Aug 14, 2024 FileMaker Server is an essential component for hosting FileMaker databases, but its built-in administrative tools often leave much to be desired, particularly for users managing large deployments or needing fine-grained control. Enter Claus Lavendt’s Missing Admin Tool, a robust, free, and open-source solution that fills the

Long Distance Upgrades in FileMaker

Richard Carlton, Jul 30, 2024, FileMaker Training Videos Menu Introduction to FileMaker Upgrades To top Upgrading FileMaker to its latest version is a decision that many organizations delay, often due to concerns about cost, downtime, or compatibility. However, running an outdated version of FileMaker comes with several risks, including slower performance, security vulnerabilities, and compatibility

OnWindowTransaction JSON

Kevin Frank, May 13, 2024, FileMaker Hacks Source: https://filemakerhacks.com/2024/05/13/onwindowtransaction-json/ Demo file:  on-window-transaction-json-v2.zipCredentials:  admin / adminMinimum version:  20.2  [for both client and server] Note: This demo file is optimized for Perform Script on Server (PSOS), and is intended to be hosted on FileMaker Server or FileMaker Cloud. Introduction Recently a colleague mentioned that they were running into a

Emergency Restoration Considerations for FileMaker Server

Jacob Taylor, April 18, 2024, FileMaker Training Videos Menu Introduction To top FileMaker Server is a critical tool for managing databases, but like all server systems, it is vulnerable to crashes, hardware failures, and software issues. To avoid operational disruptions, it’s vital to have a well-planned emergency restoration strategy in place. This detailed blog post