<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article SB: Cross-site scripting (XSS) vulnerability in Qlik Sense Enterprise in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/SB-Cross-site-scripting-XSS-vulnerability-in-Qlik-Sense/ta-p/1806970</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H2&gt;&lt;FONT size="5"&gt;Executive Summary&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;A cross-site scripting (XSS) issue, caused by improper validation of user-supplied input, has been identified in Qlik Sense Enterprise and Qlik Connector for use with SAP NetWeaver. This could lead to arbitrary JavaScript being executed in the context of a user if they visit a malicious page or link controlled by the attacker.&lt;/P&gt;
&lt;P&gt;This issue was found as part of the Qlik secure engineering program and no reports of it being exploited have been received.&lt;/P&gt;
&lt;H2&gt;&lt;FONT size="5"&gt;Affected Software&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;All Qlik Sense Enterprise versions prior to the versions listed below:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;May 2021&lt;/LI&gt;
&lt;LI&gt;February 2021 Patch 5&lt;/LI&gt;
&lt;LI&gt;November 2020 Patch 10&lt;/LI&gt;
&lt;LI&gt;September 2020 Patch 12&lt;/LI&gt;
&lt;LI&gt;June 2020 Patch 16&lt;/LI&gt;
&lt;LI&gt;April 2020 Patch 16&lt;/LI&gt;
&lt;LI&gt;February 2020 Patch 12&lt;/LI&gt;
&lt;LI&gt;November 2019 Patch 17&lt;/LI&gt;
&lt;LI&gt;Qlik Connector for use with SAP NetWeaver 7.0.7&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;FONT size="5"&gt;Severity Rating&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;This vulnerability is rated as high due to the possibility of privilege escalation.&lt;/P&gt;
&lt;P&gt;The calculated CVSS score: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N 8.2 (High)&lt;/P&gt;
&lt;H2&gt;&lt;FONT size="5"&gt;Vulnerability Details&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;Due to improper validation of user-supplied input, an authenticated user may be able insert arbitrary JavaScript into a page. Subsequent visitors to that page would then execute that JavaScript allowing the attacker to perform actions in the context of that user.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;FONT size="5"&gt;Recommendation&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;It is recommended to &lt;STRONG&gt;upgrade&lt;/STRONG&gt; Qlik Sense Enterprise&amp;nbsp;to a version containing the fixes as per the “Affected Software” section above.&lt;/LI&gt;
&lt;LI&gt;It is recommended to &lt;STRONG&gt;upgrade&lt;/STRONG&gt;&amp;nbsp;Qlik Connector for use with SAP NetWeaver to a version containing the fixes as per the “Affected Software” section above.&lt;/LI&gt;
&lt;LI&gt;Qlik Cloud Services (QCS) has already been patched.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All Qlik software can be downloaded from our official &lt;A href="https://demo.qlik.com/download/" target="_blank" rel="noopener"&gt;Qlik Download page&lt;/A&gt; (customer login required)&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 24 May 2021 23:59:28 GMT</pubDate>
    <dc:creator>Jamie_Gregory</dc:creator>
    <dc:date>2021-05-24T23:59:28Z</dc:date>
    <item>
      <title>SB: Cross-site scripting (XSS) vulnerability in Qlik Sense Enterprise</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/SB-Cross-site-scripting-XSS-vulnerability-in-Qlik-Sense/ta-p/1806970</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H2&gt;&lt;FONT size="5"&gt;Executive Summary&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;A cross-site scripting (XSS) issue, caused by improper validation of user-supplied input, has been identified in Qlik Sense Enterprise and Qlik Connector for use with SAP NetWeaver. This could lead to arbitrary JavaScript being executed in the context of a user if they visit a malicious page or link controlled by the attacker.&lt;/P&gt;
&lt;P&gt;This issue was found as part of the Qlik secure engineering program and no reports of it being exploited have been received.&lt;/P&gt;
&lt;H2&gt;&lt;FONT size="5"&gt;Affected Software&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;All Qlik Sense Enterprise versions prior to the versions listed below:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;May 2021&lt;/LI&gt;
&lt;LI&gt;February 2021 Patch 5&lt;/LI&gt;
&lt;LI&gt;November 2020 Patch 10&lt;/LI&gt;
&lt;LI&gt;September 2020 Patch 12&lt;/LI&gt;
&lt;LI&gt;June 2020 Patch 16&lt;/LI&gt;
&lt;LI&gt;April 2020 Patch 16&lt;/LI&gt;
&lt;LI&gt;February 2020 Patch 12&lt;/LI&gt;
&lt;LI&gt;November 2019 Patch 17&lt;/LI&gt;
&lt;LI&gt;Qlik Connector for use with SAP NetWeaver 7.0.7&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;&lt;FONT size="5"&gt;Severity Rating&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;This vulnerability is rated as high due to the possibility of privilege escalation.&lt;/P&gt;
&lt;P&gt;The calculated CVSS score: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N 8.2 (High)&lt;/P&gt;
&lt;H2&gt;&lt;FONT size="5"&gt;Vulnerability Details&lt;/FONT&gt;&lt;/H2&gt;
&lt;P&gt;Due to improper validation of user-supplied input, an authenticated user may be able insert arbitrary JavaScript into a page. Subsequent visitors to that page would then execute that JavaScript allowing the attacker to perform actions in the context of that user.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;FONT size="5"&gt;Recommendation&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;It is recommended to &lt;STRONG&gt;upgrade&lt;/STRONG&gt; Qlik Sense Enterprise&amp;nbsp;to a version containing the fixes as per the “Affected Software” section above.&lt;/LI&gt;
&lt;LI&gt;It is recommended to &lt;STRONG&gt;upgrade&lt;/STRONG&gt;&amp;nbsp;Qlik Connector for use with SAP NetWeaver to a version containing the fixes as per the “Affected Software” section above.&lt;/LI&gt;
&lt;LI&gt;Qlik Cloud Services (QCS) has already been patched.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All Qlik software can be downloaded from our official &lt;A href="https://demo.qlik.com/download/" target="_blank" rel="noopener"&gt;Qlik Download page&lt;/A&gt; (customer login required)&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 24 May 2021 23:59:28 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/SB-Cross-site-scripting-XSS-vulnerability-in-Qlik-Sense/ta-p/1806970</guid>
      <dc:creator>Jamie_Gregory</dc:creator>
      <dc:date>2021-05-24T23:59:28Z</dc:date>
    </item>
    <item>
      <title>Re: SB: Cross-site scripting (XSS) vulnerability in Qlik Sense Enterprise</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/SB-Cross-site-scripting-XSS-vulnerability-in-Qlik-Sense/tac-p/1880340#M5258</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;it looks like the XSS issue was resolved in Qlik Sense version September 2020, by upgrading the jQuery version.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is additional work being done in the May 2021 version. Just wanted to clarify, is that related only to the&amp;nbsp;&lt;SPAN&gt;Qlik Connector for use with SAP NetWeaver?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We are using the extensions. With regards to the XSS issue, if we are not using&amp;nbsp;Qlik Connector for use with SAP NetWeaver, are we okay with the September 2020 version, or we have to upgrade to May 2021 version?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Qlik Sense Enterprise on Windows" id="qlikSenseEnterpriseWindows"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 19:47:32 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/SB-Cross-site-scripting-XSS-vulnerability-in-Qlik-Sense/tac-p/1880340#M5258</guid>
      <dc:creator>pth21</dc:creator>
      <dc:date>2022-01-12T19:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: SB: Cross-site scripting (XSS) vulnerability in Qlik Sense Enterprise</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/SB-Cross-site-scripting-XSS-vulnerability-in-Qlik-Sense/tac-p/1880932#M5267</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/138813"&gt;@pth21&lt;/a&gt;&amp;nbsp;It affects Qlik Sense Enterprise and the SAP NetWeaver connector. If you're on September 2020, you should upgrade to the latest patch for September 2020. The fix for the issue is in September 2020 Patch 12 and above.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jan 2022 21:14:46 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/SB-Cross-site-scripting-XSS-vulnerability-in-Qlik-Sense/tac-p/1880932#M5267</guid>
      <dc:creator>Jamie_Gregory</dc:creator>
      <dc:date>2022-01-13T21:14:46Z</dc:date>
    </item>
  </channel>
</rss>

