<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Postgres vulnerability CVE-2024-4215  &amp;amp; CVE-2024-4216 in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/Postgres-vulnerability-CVE-2024-4215-amp-CVE-2024-4216/m-p/2451343#M29402</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/58383"&gt;@David_Friend&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is the bundled version&amp;nbsp;postgres 12.5 that comes with default with the old version Feb 2022 version.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;
&lt;P&gt;Amar&lt;/P&gt;</description>
    <pubDate>Sat, 11 May 2024 15:14:55 GMT</pubDate>
    <dc:creator>amarvilass</dc:creator>
    <dc:date>2024-05-11T15:14:55Z</dc:date>
    <item>
      <title>Postgres vulnerability CVE-2024-4215  &amp; CVE-2024-4216</title>
      <link>https://community.qlik.com/t5/Management-Governance/Postgres-vulnerability-CVE-2024-4215-amp-CVE-2024-4216/m-p/2450633#M29400</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;We are currently on May 2023 Patch10 version with Postgres12.&lt;/P&gt;
&lt;P&gt;Understand from our security team that there are the below two vulnerabilities for Postgres&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Cross-Site Scripting Vulnerability (CVE-2024-4216)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This vulnerability exists in pgAdmin, specifically inside the /settings/store API response json payload. Exploiting this vulnerability could allow a threat actor to execute malicious script on the client end and steal sensitive cookies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Multi-Factor Authentication Bypass (CVE-2024-4215)&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;This vulnerability affects pgAdmin, which could allow a threat actor to bypass multi-factor authentication on affected versions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is anyone aware if it affect Qlik Sense enterprise on windows?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Amar Shedage&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2024 06:51:24 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Postgres-vulnerability-CVE-2024-4215-amp-CVE-2024-4216/m-p/2450633#M29400</guid>
      <dc:creator>amarvilass</dc:creator>
      <dc:date>2024-05-09T06:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: Postgres vulnerability CVE-2024-4215  &amp; CVE-2024-4216</title>
      <link>https://community.qlik.com/t5/Management-Governance/Postgres-vulnerability-CVE-2024-4215-amp-CVE-2024-4216/m-p/2450812#M29401</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/44151"&gt;@amarvilass&lt;/a&gt;&amp;nbsp;what specific version of Postgres are you using and is it bundled/unbundled?&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2024 13:12:58 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Postgres-vulnerability-CVE-2024-4215-amp-CVE-2024-4216/m-p/2450812#M29401</guid>
      <dc:creator>David_Friend</dc:creator>
      <dc:date>2024-05-09T13:12:58Z</dc:date>
    </item>
    <item>
      <title>Re: Postgres vulnerability CVE-2024-4215  &amp; CVE-2024-4216</title>
      <link>https://community.qlik.com/t5/Management-Governance/Postgres-vulnerability-CVE-2024-4215-amp-CVE-2024-4216/m-p/2451343#M29402</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/58383"&gt;@David_Friend&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is the bundled version&amp;nbsp;postgres 12.5 that comes with default with the old version Feb 2022 version.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;
&lt;P&gt;Amar&lt;/P&gt;</description>
      <pubDate>Sat, 11 May 2024 15:14:55 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Postgres-vulnerability-CVE-2024-4215-amp-CVE-2024-4216/m-p/2451343#M29402</guid>
      <dc:creator>amarvilass</dc:creator>
      <dc:date>2024-05-11T15:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: Postgres vulnerability CVE-2024-4215  &amp; CVE-2024-4216</title>
      <link>https://community.qlik.com/t5/Management-Governance/Postgres-vulnerability-CVE-2024-4215-amp-CVE-2024-4216/m-p/2452057#M29403</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/44151"&gt;@amarvilass&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It looks like this&amp;nbsp;vulnerability only affects PgAdmin. PgAdmin is not installed by Qlik. It is only used if you do changes in the database.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 07:56:08 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Postgres-vulnerability-CVE-2024-4215-amp-CVE-2024-4216/m-p/2452057#M29403</guid>
      <dc:creator>Maria_Halley</dc:creator>
      <dc:date>2024-05-14T07:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: Postgres vulnerability CVE-2024-4215  &amp; CVE-2024-4216</title>
      <link>https://community.qlik.com/t5/Management-Governance/Postgres-vulnerability-CVE-2024-4215-amp-CVE-2024-4216/m-p/2452129#M29404</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/942"&gt;@Maria_Halley&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The reason I was checking this is to resolve an issue with Qlik due to a&amp;nbsp;&lt;SPAN&gt;custom properties being duplicated and injected multiple times after Qlik upgrade. This issue causes the jobs to fail even though the status reflect as successful. The job failure is causing the AD sync job to fail and not add new users. The solution to this lies in the below link&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-on-premise-reloads-fail-with-Warning-Conflict/ta-p/2034338" target="_blank"&gt;https://community.qlik.com/t5/Official-Support-Articles/Qlik-Sense-on-premise-reloads-fail-with-Warning-Conflict/ta-p/2034338&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The solution proposed from Qlik needs the PgAdmin to be used to remove the duplicate properties. Will you be able to suggest if this will cause any issue?&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;
&lt;P&gt;Amar&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 09:39:04 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Postgres-vulnerability-CVE-2024-4215-amp-CVE-2024-4216/m-p/2452129#M29404</guid>
      <dc:creator>amarvilass</dc:creator>
      <dc:date>2024-05-14T09:39:04Z</dc:date>
    </item>
  </channel>
</rss>

