<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Critical Security fixes for Qlik Sense Enterprise for Windows (CVE-2023-41266, CVE-2023-41265) in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801</link>
    <description>&lt;H3 aria-level="2"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Executive Summary&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Two security issues in Qlik Sense Enterprise for Windows have been identified and patches made available. If the two vulnerabilities are combined and successfully exploited, these issues could lead to a compromise of the server running the Qlik Sense software, including unauthenticated remote code execution (RCE).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;These issues were identified and responsibly reported to Qlik by Adam Crosser and Thomas Hendrickson of &lt;A href="https://www.praetorian.com/" target="_blank" rel="noopener"&gt;Praetorian&lt;/A&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Qlik has received reports that this vulnerability may be being used by malicious actors. Customers should confirm they have applied the necessary patches outlined in this bulletin. If there are additional questions, customers may log a case with&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Support/ct-p/qlikSupport" target="_blank" rel="noopener"&gt;Qlik Support.&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="2"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Affected Software&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:40,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN class="TextRun SCXW224515680 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt;All versions of Qlik Sense Enterprise for Windows &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="TextRun SCXW224515680 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt;&lt;STRONG&gt;prior&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="TextRun SCXW224515680 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt;to&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt; and including&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt; these releases are &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt;impacted&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt;:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW224515680 BCX0" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;SPAN&gt;May 2023 Patch 3&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;February 2023 Patch 7&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;November 2022 Patch 10&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;August 2022 Patch 12&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 aria-level="1"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Severity Rating&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Using the CVSS V3.1 scoring system (&lt;SPAN class="TextRun SCXW239168632 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW239168632 BCX0"&gt;&lt;A href="https://nvd.nist.gov/vuln-metrics/cvss" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln-metrics/cvss&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;), Qlik rates one as high severity and one as critical.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="1"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Vulnerability Details&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;CVE-2023-41266&lt;/STRONG&gt; (QB-21220) Path traversal in Qlik Sense Enterprise for Windows&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Severity:&lt;/STRONG&gt;&lt;/FONT&gt; CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;(8.2 High)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;&lt;SPAN class="TextRun SCXW170904154 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW170904154 BCX0"&gt;Due to improper validation of user supplied input, it is &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW170904154 BCX0"&gt;possible for&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;SPAN class="TextRun SCXW170904154 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW170904154 BCX0"&gt;an unauthenticated remote attacker to generate an anonymous session which allows them to perform HTTP requests to unauthorized endpoints.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;CVE-2023-41265&lt;/STRONG&gt; (QB-21222) HTTP Tunneling vulnerability in&lt;/SPAN&gt; &lt;SPAN data-contrast="none"&gt;Qlik Sense Enterprise for Windows&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Severity:&lt;/STRONG&gt;&lt;/FONT&gt; CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;(9.6 Critical)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN class="TextRun SCXW222164418 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt;Due to improper validation of HTTP Headers&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt; a remote attacker&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun AdvancedProofingIssueV2Themed SCXW222164418 BCX0"&gt;is able&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun AdvancedProofingIssueV2Themed SCXW222164418 BCX0"&gt; to&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt; elevate their privilege by tunnelling HTTP requests&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt;,&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt; allowing them to execute&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt;HTTP requests &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt;on&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt; the backend server hosting the repository &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt;application.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW222164418 BCX0" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Resolution&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Recommendation&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;BLOCKQUOTE class="quote"&gt;These recommendations apply at the time of writing (August 2023). For up to date information, please refer to the &lt;A href="https://community.qlik.com/t5/Labels-page/bd-p/Category_Labels?categoryId=qlik-support-updates-blog&amp;amp;corenode=boards&amp;amp;labelText=Security+Notice&amp;amp;nodetype=boards" target="_blank" rel="noopener"&gt;Qlik Security Notice&lt;/A&gt; and review the latest &lt;A href="https://community.qlik.com/t5/Release-Notes/tkb-p/ReleaseNotes" target="_blank" rel="noopener"&gt;Release Notes&lt;/A&gt; for your Qlik Sense version. Always update to the &lt;EM&gt;most&amp;nbsp;recent&lt;/EM&gt;&amp;nbsp;patch.&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN class="TextRun SCXW153868444 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt;Customers should&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt; upgrade Qlik Sense Enterprise for Windows to a version &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt;containing&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt; fixes for these issues. &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt;Fixes are available&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt; for the &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt;following&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt;versions&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt;:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW153868444 BCX0" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;August 2023 Initial Release&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;May 2023 Patch 4&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;February 2023 Patch 8&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;November 2022 Patch 11&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;August 2022 Patch 13&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;All Qlik software can be downloaded from our official &lt;/SPAN&gt;&lt;A href="https://community.qlik.com/t5/Product-Downloads/tkb-p/Downloads" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Qlik Download page&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; (customer login required).&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 15 May 2024 07:25:44 GMT</pubDate>
    <dc:creator>Sonja_Bauernfeind</dc:creator>
    <dc:date>2024-05-15T07:25:44Z</dc:date>
    <item>
      <title>Critical Security fixes for Qlik Sense Enterprise for Windows (CVE-2023-41266, CVE-2023-41265)</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801</link>
      <description>&lt;H3 aria-level="2"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Executive Summary&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Two security issues in Qlik Sense Enterprise for Windows have been identified and patches made available. If the two vulnerabilities are combined and successfully exploited, these issues could lead to a compromise of the server running the Qlik Sense software, including unauthenticated remote code execution (RCE).&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;These issues were identified and responsibly reported to Qlik by Adam Crosser and Thomas Hendrickson of &lt;A href="https://www.praetorian.com/" target="_blank" rel="noopener"&gt;Praetorian&lt;/A&gt;.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Qlik has received reports that this vulnerability may be being used by malicious actors. Customers should confirm they have applied the necessary patches outlined in this bulletin. If there are additional questions, customers may log a case with&amp;nbsp;&lt;A href="https://community.qlik.com/t5/Support/ct-p/qlikSupport" target="_blank" rel="noopener"&gt;Qlik Support.&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="2"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Affected Software&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN data-ccp-props="{&amp;quot;134245418&amp;quot;:true,&amp;quot;134245529&amp;quot;:true,&amp;quot;201341983&amp;quot;:0,&amp;quot;335559738&amp;quot;:40,&amp;quot;335559739&amp;quot;:0,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN class="TextRun SCXW224515680 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt;All versions of Qlik Sense Enterprise for Windows &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="TextRun SCXW224515680 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt;&lt;STRONG&gt;prior&lt;/STRONG&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="TextRun SCXW224515680 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt;to&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt; and including&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt; these releases are &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt;impacted&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW224515680 BCX0"&gt;:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW224515680 BCX0" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL class="lia-list-style-type-circle"&gt;
&lt;LI&gt;&lt;SPAN&gt;May 2023 Patch 3&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;February 2023 Patch 7&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;November 2022 Patch 10&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;August 2022 Patch 12&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 aria-level="1"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Severity Rating&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;Using the CVSS V3.1 scoring system (&lt;SPAN class="TextRun SCXW239168632 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW239168632 BCX0"&gt;&lt;A href="https://nvd.nist.gov/vuln-metrics/cvss" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln-metrics/cvss&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;), Qlik rates one as high severity and one as critical.&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3 aria-level="1"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Vulnerability Details&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/H3&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;CVE-2023-41266&lt;/STRONG&gt; (QB-21220) Path traversal in Qlik Sense Enterprise for Windows&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Severity:&lt;/STRONG&gt;&lt;/FONT&gt; CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;(8.2 High)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN&gt;&lt;SPAN class="TextRun SCXW170904154 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW170904154 BCX0"&gt;Due to improper validation of user supplied input, it is &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW170904154 BCX0"&gt;possible for&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;SPAN class="TextRun SCXW170904154 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW170904154 BCX0"&gt;an unauthenticated remote attacker to generate an anonymous session which allows them to perform HTTP requests to unauthorized endpoints.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="none"&gt;&lt;STRONG&gt;CVE-2023-41265&lt;/STRONG&gt; (QB-21222) HTTP Tunneling vulnerability in&lt;/SPAN&gt; &lt;SPAN data-contrast="none"&gt;Qlik Sense Enterprise for Windows&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Severity:&lt;/STRONG&gt;&lt;/FONT&gt; CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN data-contrast="auto"&gt;(9.6 Critical)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;&lt;SPAN class="TextRun SCXW222164418 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt;Due to improper validation of HTTP Headers&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt; a remote attacker&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun AdvancedProofingIssueV2Themed SCXW222164418 BCX0"&gt;is able&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun AdvancedProofingIssueV2Themed SCXW222164418 BCX0"&gt; to&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt; elevate their privilege by tunnelling HTTP requests&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt;,&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt; allowing them to execute&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt;HTTP requests &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt;on&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt; the backend server hosting the repository &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW222164418 BCX0"&gt;application.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW222164418 BCX0" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Resolution&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Recommendation&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;BLOCKQUOTE class="quote"&gt;These recommendations apply at the time of writing (August 2023). For up to date information, please refer to the &lt;A href="https://community.qlik.com/t5/Labels-page/bd-p/Category_Labels?categoryId=qlik-support-updates-blog&amp;amp;corenode=boards&amp;amp;labelText=Security+Notice&amp;amp;nodetype=boards" target="_blank" rel="noopener"&gt;Qlik Security Notice&lt;/A&gt; and review the latest &lt;A href="https://community.qlik.com/t5/Release-Notes/tkb-p/ReleaseNotes" target="_blank" rel="noopener"&gt;Release Notes&lt;/A&gt; for your Qlik Sense version. Always update to the &lt;EM&gt;most&amp;nbsp;recent&lt;/EM&gt;&amp;nbsp;patch.&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;SPAN class="TextRun SCXW153868444 BCX0" data-contrast="auto"&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt;Customers should&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt; upgrade Qlik Sense Enterprise for Windows to a version &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt;containing&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt; fixes for these issues. &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt;Fixes are available&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt; for the &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt;following&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt;versions&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW153868444 BCX0"&gt;:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW153868444 BCX0" data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;August 2023 Initial Release&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;May 2023 Patch 4&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;February 2023 Patch 8&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;November 2022 Patch 11&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI data-leveltext="" data-font="Symbol" data-listid="1" data-list-defn-props="{&amp;quot;335552541&amp;quot;:1,&amp;quot;335559684&amp;quot;:-2,&amp;quot;335559685&amp;quot;:720,&amp;quot;335559991&amp;quot;:360,&amp;quot;469769226&amp;quot;:&amp;quot;Symbol&amp;quot;,&amp;quot;469769242&amp;quot;:[8226],&amp;quot;469777803&amp;quot;:&amp;quot;left&amp;quot;,&amp;quot;469777804&amp;quot;:&amp;quot;&amp;quot;,&amp;quot;469777815&amp;quot;:&amp;quot;hybridMultilevel&amp;quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"&gt;&lt;SPAN data-contrast="auto"&gt;August 2022 Patch 13&lt;/SPAN&gt;&lt;SPAN data-ccp-props="{&amp;quot;201341983&amp;quot;:0,&amp;quot;335559739&amp;quot;:160,&amp;quot;335559740&amp;quot;:259}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN data-contrast="auto"&gt;All Qlik software can be downloaded from our official &lt;/SPAN&gt;&lt;A href="https://community.qlik.com/t5/Product-Downloads/tkb-p/Downloads" target="_blank" rel="noopener"&gt;&lt;SPAN data-contrast="none"&gt;Qlik Download page&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN data-contrast="auto"&gt; (customer login required).&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 07:25:44 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2024-05-15T07:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: Critical Security fixes for Qlik Sense Enterprise for Windows (CVE-2023-41266, CVE-2023-41265)</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/tac-p/2110868#M10017</link>
      <description>&lt;P&gt;For discussions and questions, comment directly on the &lt;A href="https://community.qlik.com/t5/Support-Updates/Qlik-Sense-Enterprise-for-Windows-New-Security-Patches-Available/ba-p/2108549" target="_blank" rel="noopener"&gt;related blog post&lt;/A&gt;.&amp;nbsp; We will be monitoring it. Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 13:16:13 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/tac-p/2110868#M10017</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2023-08-29T13:16:13Z</dc:date>
    </item>
  </channel>
</rss>

