<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Apache Log4j Vulenrability in Qlik Replicate</title>
    <link>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2480031#M12591</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/161637"&gt;@PICTConversionTeamDevs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It doesn't seem like it would, but we should check on this issue with our internal support team / R &amp;amp; D. We don't have a way to elevate issues from our forum to them, could you please open a support case for this?&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Dana&lt;/P&gt;</description>
    <pubDate>Thu, 05 Sep 2024 20:09:16 GMT</pubDate>
    <dc:creator>Dana_Baldwin</dc:creator>
    <dc:date>2024-09-05T20:09:16Z</dc:date>
    <item>
      <title>Apache Log4j Vulenrability</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2479978#M12587</link>
      <description>&lt;P&gt;we have found below two Vulnerability for file&amp;nbsp;&lt;SPAN&gt;Attunity\Replicate\java\java_file_factory.jar&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;CVE-2019-17571&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;CVE-2022-23305&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;Back in 2021, we did fix the Apache Log4j vulnerability by upgrading it to the higher version with the following documents, but somehow the file&amp;nbsp;&lt;SPAN&gt;Attunity\Replicate\java\java_file_factory.jar still reference to old log4j&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;PS D:\Attunity\Replicate\endpoint_srv\externals&amp;gt; ls log4j*&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Directory: D:\Attunity\Replicate\endpoint_srv\externals&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Mode LastWriteTime Length Name&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;---- ------------- ------ ----&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-a---- 6/3/2020 11:09 AM 264060 log4j-api-2.11.1.jar&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-a---- 6/3/2020 11:09 AM 1607947 log4j-core-2.11.1.jar-vulnerable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-a---- 12/17/2021 4:03 PM 1589223 log4j-core-nolookup-2.11.1.jar&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;We know QLIK does not support Replicate 6.6 and can't provide any fix. Does anyone know if there is any fix/workaround to update the log4j version in file&amp;nbsp;&lt;SPAN&gt;Attunity\Replicate\java\java_file_factory.jar&lt;BR /&gt;&lt;BR /&gt;we are planning to upgrade qlik replcate but that will take some time.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 15:32:23 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2479978#M12587</guid>
      <dc:creator>PICTConversionTeamDevs</dc:creator>
      <dc:date>2024-09-05T15:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4j Vulenrability</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2480008#M12588</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/161637"&gt;@PICTConversionTeamDevs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you have mentioned, upgrading from version 6.6 is the best course of action to alleviate this vulnerability, but we do understand that an upgrade should be well planned and tested, especially when moving from an unsupported version as you will need to apply more than one upgrade.&lt;/P&gt;
&lt;P&gt;Please refer to this knowledge article on how to update log4j without upgrading Replicate. Please test this thoroughly in a pre-production environment before attempting in production:&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-45105-CVE-2021-44832-Update-to-log4j-2-17-1-for-Qlik/ta-p/1876190" target="_blank"&gt;CVE-2021-45105/CVE-2021-44832 - Update to log4j 2.... - Qlik Community - 1876190&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;As you plan your upgrade, you may find this information helpful:&lt;/P&gt;
&lt;P&gt;Upgrade guide/best practices:&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/Qlik-Replicate-Upgrade-Best-Practices/ta-p/1729651" target="_blank"&gt;Qlik Replicate Upgrade Best Practices - Qlik Community - 1729651&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;As noted in this link, please ensure your operating system, source/target endpoint versions are supported, and any needed updates to driver software are considered.&lt;/P&gt;
&lt;P&gt;Please refer to the release notes for the version you will upgrade to regarding which versions need to be installed to get to your desired end version.&lt;/P&gt;
&lt;P&gt;I hope this helps!&lt;/P&gt;
&lt;P&gt;Dana&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 18:22:27 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2480008#M12588</guid>
      <dc:creator>Dana_Baldwin</dc:creator>
      <dc:date>2024-09-05T18:22:27Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4j Vulenrability</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2480011#M12590</link>
      <description>&lt;P&gt;Thanks for the details. We followed similar documents around 2021 to upgrade the log4j from 1.2.17 to 2.* version.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Directory: D:\Attunity\Replicate\endpoint_srv\externals&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Mode LastWriteTime Length Name&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;---- ------------- ------ ----&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-a---- 6/3/2020 11:09 AM 264060 log4j-api-2.11.1.jar&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-a---- 6/3/2020 11:09 AM 1607947 log4j-core-2.11.1.jar-vulnerable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-a---- 12/17/2021 4:03 PM 1589223 log4j-core-nolookup-2.11.1.jar&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;but somehow this file "&lt;SPAN&gt;Attunity\Replicate\java\java_file_factory.jar"&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp; is still&amp;nbsp; referencing to log4j 1.2.17&lt;BR /&gt;&lt;BR /&gt;Do you think upgrading the log4j from 2.11.1 to 2.17.1, as mentioned in this document will also update the log4j version in the file&amp;nbsp;&lt;SPAN&gt;Attunity\Replicate\java\java_file_factory.jar??&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 18:40:23 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2480011#M12590</guid>
      <dc:creator>PICTConversionTeamDevs</dc:creator>
      <dc:date>2024-09-05T18:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4j Vulenrability</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2480031#M12591</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/161637"&gt;@PICTConversionTeamDevs&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It doesn't seem like it would, but we should check on this issue with our internal support team / R &amp;amp; D. We don't have a way to elevate issues from our forum to them, could you please open a support case for this?&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Dana&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 20:09:16 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2480031#M12591</guid>
      <dc:creator>Dana_Baldwin</dc:creator>
      <dc:date>2024-09-05T20:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4j Vulenrability</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2480044#M12592</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/161637"&gt;@PICTConversionTeamDevs&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Besides&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/121014"&gt;@Dana_Baldwin&lt;/a&gt;&amp;nbsp;comments, looks to me the two&amp;nbsp;&lt;SPAN&gt;vulnerabilities&amp;nbsp;&amp;nbsp;do not apply to Qlik Replicate as&amp;nbsp;Qlik Replicate do not use the SocketServer class and&amp;nbsp;Apache Chainsaw. Let's get confirmation from CF/R&amp;amp;D.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;John.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2024 01:24:43 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2480044#M12592</guid>
      <dc:creator>john_wang</dc:creator>
      <dc:date>2024-09-06T01:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4j Vulenrability</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2480227#M12606</link>
      <description>&lt;P&gt;Thanks John,&lt;/P&gt;
&lt;P&gt;Those two vulnerabilities are for Log4J 1.2.17, referenced in qlik path \&lt;SPAN&gt;Attunity\Replicate\java\java_file_factory.jar.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;We may need to either update the version in that jar file or remove the reference.&lt;BR /&gt;&lt;BR /&gt;I already have a QLIK case open regarding this issue.&lt;/P&gt;
&lt;H1&gt;00306526: Apache Log4j Vulenrability&lt;/H1&gt;</description>
      <pubDate>Fri, 06 Sep 2024 18:13:55 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2480227#M12606</guid>
      <dc:creator>PICTConversionTeamDevs</dc:creator>
      <dc:date>2024-09-06T18:13:55Z</dc:date>
    </item>
    <item>
      <title>Re: Apache Log4j Vulenrability</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2480295#M12612</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/161637"&gt;@PICTConversionTeamDevs&lt;/a&gt;&amp;nbsp;, our support will work on it.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;John.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Sep 2024 11:00:27 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Apache-Log4j-Vulenrability/m-p/2480295#M12612</guid>
      <dc:creator>john_wang</dc:creator>
      <dc:date>2024-09-08T11:00:27Z</dc:date>
    </item>
  </channel>
</rss>

