<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Qlik Visibility - Spring Framework vulnerability CVE-2022-22965 in Qlik Replicate</title>
    <link>https://community.qlik.com/t5/Qlik-Replicate/Qlik-Visibility-Spring-Framework-vulnerability-CVE-2022-22965/m-p/1927023#M2583</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Looking for guidance on Attunity Visibility software v7.3 impact for Spring Framework vulnerability CVE-2022-22965. PNC Security has requested remediation as per below:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Spring Framework contains a flaw in the CachedIntrospectionResults class in spring-beans/src/main/java/org/springframework/beans/CachedIntrospectionResults.java related to insecure introspection when using request parameter binding. This may allow a remote attacker to invoke arbitrary Java class methods and execute arbitrary code.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;I've found the reference in your support documentation for the subject CVE vulnerability but there is no mention of Qlik Visibility software. Would appreciate some help.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Using:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Operating System: Linux&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Operating System Version: RHEL 7.9&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Product Release: V7.3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Environment Type: Production&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Vikki Turner&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 05 May 2022 16:49:37 GMT</pubDate>
    <dc:creator>Vikki</dc:creator>
    <dc:date>2022-05-05T16:49:37Z</dc:date>
    <item>
      <title>Qlik Visibility - Spring Framework vulnerability CVE-2022-22965</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Qlik-Visibility-Spring-Framework-vulnerability-CVE-2022-22965/m-p/1927023#M2583</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Looking for guidance on Attunity Visibility software v7.3 impact for Spring Framework vulnerability CVE-2022-22965. PNC Security has requested remediation as per below:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Spring Framework contains a flaw in the CachedIntrospectionResults class in spring-beans/src/main/java/org/springframework/beans/CachedIntrospectionResults.java related to insecure introspection when using request parameter binding. This may allow a remote attacker to invoke arbitrary Java class methods and execute arbitrary code.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;I've found the reference in your support documentation for the subject CVE vulnerability but there is no mention of Qlik Visibility software. Would appreciate some help.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Using:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Operating System: Linux&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Operating System Version: RHEL 7.9&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Product Release: V7.3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Environment Type: Production&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Vikki Turner&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2022 16:49:37 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Qlik-Visibility-Spring-Framework-vulnerability-CVE-2022-22965/m-p/1927023#M2583</guid>
      <dc:creator>Vikki</dc:creator>
      <dc:date>2022-05-05T16:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Visibility - Spring Framework vulnerability CVE-2022-22965</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Qlik-Visibility-Spring-Framework-vulnerability-CVE-2022-22965/m-p/1927029#M2586</link>
      <description>&lt;P&gt;Good Day!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:13px;"&gt;Visibility is a retired product and no longer supported&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:13px;"&gt;&lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Retirement-of-legacy-Attunity-products-on-January-31-2022/ba-p/1732910" target="_blank"&gt;https://community.qlik.com/t5/Support-Updates-Blog/Retirement-of-legacy-Attunity-products-on-January-31-2022/ba-p/1732910&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:13px;"&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="background-color:rgb(255,255,255);color:rgb(24,24,24);font-size:13px;"&gt;Lyka&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 May 2022 17:03:01 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Qlik-Visibility-Spring-Framework-vulnerability-CVE-2022-22965/m-p/1927029#M2586</guid>
      <dc:creator>lyka</dc:creator>
      <dc:date>2022-05-05T17:03:01Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Visibility - Spring Framework vulnerability CVE-2022-22965</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Qlik-Visibility-Spring-Framework-vulnerability-CVE-2022-22965/m-p/1931949#M2708</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/160304"&gt;@Vikki&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN&gt;The &lt;/SPAN&gt;s&lt;SPAN class="lia-message-unread lia-message-unread-windows"&gt;pring Framework vulnerability&amp;nbsp; listed here is&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt; more involved and would probably require code changes. Since the product has reached end of life,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt; I am not sure if&amp;nbsp; R&amp;amp;D can rebuild installation kit for you with the fix.&amp;nbsp; That being said, &lt;/SPAN&gt;&lt;SPAN&gt;I am checking with development team on this to see if we can help you in anyway. So, give me some time and I'll get back to you on this.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Nanda&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 16:45:40 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Qlik-Visibility-Spring-Framework-vulnerability-CVE-2022-22965/m-p/1931949#M2708</guid>
      <dc:creator>Nanda_Ravindra</dc:creator>
      <dc:date>2022-05-17T16:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: Qlik Visibility - Spring Framework vulnerability CVE-2022-22965</title>
      <link>https://community.qlik.com/t5/Qlik-Replicate/Qlik-Visibility-Spring-Framework-vulnerability-CVE-2022-22965/m-p/1938033#M2879</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/160304"&gt;@Vikki&lt;/a&gt; I checked with the R&amp;amp;D team, and they did confirm that it needs a code rebuild and since the product has reached the end of life, we won't be able to build the code and share the new build.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Retirement-of-legacy-Attunity-products-on-January-31-2022/ba-p/1732910" target="_blank"&gt;https://community.qlik.com/t5/Support-Updates-Blog/Retirement-of-legacy-Attunity-products-on-January-31-2022/ba-p/1732910&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Nanda&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2022 03:32:19 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Qlik-Replicate/Qlik-Visibility-Spring-Framework-vulnerability-CVE-2022-22965/m-p/1938033#M2879</guid>
      <dc:creator>Nanda_Ravindra</dc:creator>
      <dc:date>2022-06-01T03:32:19Z</dc:date>
    </item>
  </channel>
</rss>

