<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Critical vulnerability in Javascript library! in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/Critical-vulnerability-in-Javascript-library/m-p/2075025#M29665</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;what version of node.js/VM2 is currently being used with qlik sense products and when will there be an update. Since we are in the hospital sector, this is important for our customers. I had already opened a ticket with support, but they think it is not an incident and I should contact the community?!?&lt;/P&gt;
&lt;P&gt;Here are the information about the&amp;nbsp;Critical vulnerability in Javascript library:&lt;/P&gt;
&lt;P&gt;CVE: CVE-2023-29017 / CVE-2023-29199 / CVE-2023-30547 / CVE-2023-32314&lt;BR /&gt;Scope: Remote Code Execution&lt;BR /&gt;Affected versions: &lt;STRONG&gt;Javascript library vm2 &amp;lt; 3.9.18&lt;/STRONG&gt;&lt;BR /&gt;Suggested Action: &lt;STRONG&gt;Update to current version 3.9.18&lt;/STRONG&gt;, No known workarounds&lt;/P&gt;
&lt;P&gt;F.e.:&lt;BR /&gt;For the listed system, we were able to identify that the server was running a NodeJS server.&lt;BR /&gt;Node.js version:&amp;nbsp; 14.17.6&lt;/P&gt;
&lt;P&gt;File path:&amp;nbsp;&amp;nbsp; C:\Program Files\Qlik\Sense\ServiceDispatcher\Node\node.exe&lt;BR /&gt;&lt;BR /&gt;Thank you in advance!&lt;/P&gt;
&lt;P&gt;br&lt;/P&gt;
&lt;P&gt;Christian&lt;/P&gt;</description>
    <pubDate>Wed, 24 May 2023 12:00:14 GMT</pubDate>
    <dc:creator>C-Hopf</dc:creator>
    <dc:date>2023-05-24T12:00:14Z</dc:date>
    <item>
      <title>Critical vulnerability in Javascript library!</title>
      <link>https://community.qlik.com/t5/Management-Governance/Critical-vulnerability-in-Javascript-library/m-p/2075025#M29665</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;what version of node.js/VM2 is currently being used with qlik sense products and when will there be an update. Since we are in the hospital sector, this is important for our customers. I had already opened a ticket with support, but they think it is not an incident and I should contact the community?!?&lt;/P&gt;
&lt;P&gt;Here are the information about the&amp;nbsp;Critical vulnerability in Javascript library:&lt;/P&gt;
&lt;P&gt;CVE: CVE-2023-29017 / CVE-2023-29199 / CVE-2023-30547 / CVE-2023-32314&lt;BR /&gt;Scope: Remote Code Execution&lt;BR /&gt;Affected versions: &lt;STRONG&gt;Javascript library vm2 &amp;lt; 3.9.18&lt;/STRONG&gt;&lt;BR /&gt;Suggested Action: &lt;STRONG&gt;Update to current version 3.9.18&lt;/STRONG&gt;, No known workarounds&lt;/P&gt;
&lt;P&gt;F.e.:&lt;BR /&gt;For the listed system, we were able to identify that the server was running a NodeJS server.&lt;BR /&gt;Node.js version:&amp;nbsp; 14.17.6&lt;/P&gt;
&lt;P&gt;File path:&amp;nbsp;&amp;nbsp; C:\Program Files\Qlik\Sense\ServiceDispatcher\Node\node.exe&lt;BR /&gt;&lt;BR /&gt;Thank you in advance!&lt;/P&gt;
&lt;P&gt;br&lt;/P&gt;
&lt;P&gt;Christian&lt;/P&gt;</description>
      <pubDate>Wed, 24 May 2023 12:00:14 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Critical-vulnerability-in-Javascript-library/m-p/2075025#M29665</guid>
      <dc:creator>C-Hopf</dc:creator>
      <dc:date>2023-05-24T12:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: Critical vulnerability in Javascript library!</title>
      <link>https://community.qlik.com/t5/Management-Governance/Critical-vulnerability-in-Javascript-library/m-p/2076609#M29666</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/149175"&gt;@C-Hopf&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Thanks for posting.&lt;/P&gt;
&lt;P&gt;I did scanned the installed files of Qlik Sense client managed and not found the node module named vm2 in any folder.&lt;/P&gt;
&lt;P&gt;As we can see other modules been used like the ones listed inside this path:&lt;/P&gt;
&lt;P&gt;...\NotifierService\node_modules&lt;/P&gt;
&lt;P&gt;If you have a report indicating that such library been used, please do open a case with us immediately following this article:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.qlik.com/t5/Official-Support-Articles/Qlik-Security-Vulnerability-Policy/ta-p/1713629" target="_blank"&gt;https://community.qlik.com/t5/Official-Support-Articles/Qlik-Security-Vulnerability-Policy/ta-p/1713629&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;You have further information on our product security at:&amp;nbsp;&lt;A href="https://www.qlik.com/us/trust" target="_blank"&gt;https://www.qlik.com/us/trust&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your collaboration.&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Albert&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2023 06:21:50 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/Critical-vulnerability-in-Javascript-library/m-p/2076609#M29666</guid>
      <dc:creator>Albert_Candelario</dc:creator>
      <dc:date>2023-05-26T06:21:50Z</dc:date>
    </item>
  </channel>
</rss>

