<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869994</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;Qlik is providing these mitigation steps as a temporary measure. A patch will be provided and linked here; customers are advised to move to the patch as soon as it is available.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Patches are available. See&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_self"&gt;Vulnerability Testing - Apache Log4j, reference CVE-2021-44228 (also referred to as Log4Shell)&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;for your release and the relevant patch.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Upgrade at the earliest.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;LI-PRODUCT title="Qlik Enterprise Manager" id="qlikEnterpriseManager"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation steps to follow Enterprise Manager log4j vulnerability:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Stop the Enterprise Manager service.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Edit the file &lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;\Enterprise Manager\java\bin\atajs.bat&lt;/FONT&gt; (&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;&lt;/FONT&gt; typically refers to "C:\Program Files\Attunity")&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;Add the string &lt;STRONG&gt;&lt;FONT face="courier new,courier" color="#FF0000"&gt;‐Dlog4j2.formatMsgNoLookups=true&lt;/FONT&gt;&lt;/STRONG&gt; in the location shown below (last line of script):&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;@Echo off&lt;BR /&gt;REM attunity trend analysis java server configuration/run script&lt;BR /&gt;&lt;BR /&gt;REM e.g. AT_PROD = C:\Program Files\Attunity\Enterprise Manager\java_server&lt;BR /&gt;for %%A in ("%~dp0..") do set AT_PROD=%%~fA&lt;BR /&gt;&lt;BR /&gt;REM list plugins here&lt;BR /&gt;SET AT_PLUGIN_LIST=-plugins analytics_ctl&lt;BR /&gt;&lt;BR /&gt;REM set data directory based on the name of this script&lt;BR /&gt;set AT_DATA_SUFFIX=&lt;BR /&gt;for /F "tokens=2 delims=_" %%A in ("%~n0") do set AT_DATA_SUFFIX=%%A&lt;BR /&gt;&lt;BR /&gt;if "%AT_DATA_SUFFIX%" == "" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; set AT_DATA=&lt;BR /&gt;) else (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; set AT_DATA=-d data_%AT_DATA_SUFFIX%&lt;BR /&gt;)&lt;BR /&gt;&lt;BR /&gt;SET AT_ANALYTICS=%AT_PROD%\lib\jvm\bin\aemanalytics.exe&lt;BR /&gt;SET AT_EXTERNAL=%AT_PROD%\external&lt;BR /&gt;SET AT_LIB=%AT_PROD%\lib&lt;BR /&gt;SET AT_INFRA_JAR=%AT_LIB%\attunity.infrastructure.jar&lt;BR /&gt;SET AT_PLUGINS=%AT_PROD%\plugins&lt;BR /&gt;SET AT_MAIN=com.attunity.infrastructure.server.PluginServer&lt;BR /&gt;&lt;BR /&gt;REM&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;lt;-------------- Fix Here ------------&amp;gt;&lt;BR /&gt;"%AT_ANALYTICS%" %JAVA_LIB_PATH%&amp;nbsp;&lt;STRONG&gt;&amp;nbsp;&lt;FONT color="#FF0000"&gt;‐Dlog4j2.formatMsgNoLookups=true&lt;/FONT&gt;&lt;/STRONG&gt;&amp;nbsp;-cp "%AT_INFRA_JAR%";"%AT_PLUGINS%"/*;"%AT_EXTERNAL%"/*;"%AT_LIB%"/* %AT_MAIN% %AT_DATA% %AT_PLUGIN_LIST% %*&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;Save the file.&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;Locate the vulnerable log4j-core-&amp;lt;version#&amp;gt;.jar file and rename/move it to ../log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;LI-CODE lang="markup"&gt;$ cd &amp;lt;installation-root&amp;gt;\Enterprise Manager\java\external

$ ren log4j-core-&amp;lt;version#&amp;gt;.jar  ..\log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Download the non-vulnerable jar named&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;log4j-core-nolookup-&amp;lt;version#&amp;gt;.jar&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp; from this page and place it in the same location as the vulnerable jar.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Restart the Enterprise Manager Windows service.&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;$ sc stop AttunityEnterpriseManager&lt;BR /&gt;&lt;BR /&gt;$ sc start AttunityEnterpriseManager&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Note that if you have a customized Enterprise Manager start script, you should perform the equivalent edit on your modified start script.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on the Log4j vulnerability, please visit the &lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_blank" rel="noopener"&gt;Support Updates Blog&lt;/A&gt; post.&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 25 Jan 2022 12:48:24 GMT</pubDate>
    <dc:creator>Jamie_Gregory</dc:creator>
    <dc:date>2022-01-25T12:48:24Z</dc:date>
    <item>
      <title>CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869994</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;Qlik is providing these mitigation steps as a temporary measure. A patch will be provided and linked here; customers are advised to move to the patch as soon as it is available.&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Patches are available. See&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_self"&gt;Vulnerability Testing - Apache Log4j, reference CVE-2021-44228 (also referred to as Log4Shell)&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;for your release and the relevant patch.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;&lt;SPAN class="mc-variable CommonComponents.GeoAnalyticsConnector variable"&gt;Upgrade at the earliest.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;LI-PRODUCT title="Qlik Enterprise Manager" id="qlikEnterpriseManager"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation steps to follow Enterprise Manager log4j vulnerability:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;OL&gt;
&lt;LI&gt;Stop the Enterprise Manager service.&amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Edit the file &lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;\Enterprise Manager\java\bin\atajs.bat&lt;/FONT&gt; (&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;&lt;/FONT&gt; typically refers to "C:\Program Files\Attunity")&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;Add the string &lt;STRONG&gt;&lt;FONT face="courier new,courier" color="#FF0000"&gt;‐Dlog4j2.formatMsgNoLookups=true&lt;/FONT&gt;&lt;/STRONG&gt; in the location shown below (last line of script):&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;@Echo off&lt;BR /&gt;REM attunity trend analysis java server configuration/run script&lt;BR /&gt;&lt;BR /&gt;REM e.g. AT_PROD = C:\Program Files\Attunity\Enterprise Manager\java_server&lt;BR /&gt;for %%A in ("%~dp0..") do set AT_PROD=%%~fA&lt;BR /&gt;&lt;BR /&gt;REM list plugins here&lt;BR /&gt;SET AT_PLUGIN_LIST=-plugins analytics_ctl&lt;BR /&gt;&lt;BR /&gt;REM set data directory based on the name of this script&lt;BR /&gt;set AT_DATA_SUFFIX=&lt;BR /&gt;for /F "tokens=2 delims=_" %%A in ("%~n0") do set AT_DATA_SUFFIX=%%A&lt;BR /&gt;&lt;BR /&gt;if "%AT_DATA_SUFFIX%" == "" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; set AT_DATA=&lt;BR /&gt;) else (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; set AT_DATA=-d data_%AT_DATA_SUFFIX%&lt;BR /&gt;)&lt;BR /&gt;&lt;BR /&gt;SET AT_ANALYTICS=%AT_PROD%\lib\jvm\bin\aemanalytics.exe&lt;BR /&gt;SET AT_EXTERNAL=%AT_PROD%\external&lt;BR /&gt;SET AT_LIB=%AT_PROD%\lib&lt;BR /&gt;SET AT_INFRA_JAR=%AT_LIB%\attunity.infrastructure.jar&lt;BR /&gt;SET AT_PLUGINS=%AT_PROD%\plugins&lt;BR /&gt;SET AT_MAIN=com.attunity.infrastructure.server.PluginServer&lt;BR /&gt;&lt;BR /&gt;REM&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;lt;-------------- Fix Here ------------&amp;gt;&lt;BR /&gt;"%AT_ANALYTICS%" %JAVA_LIB_PATH%&amp;nbsp;&lt;STRONG&gt;&amp;nbsp;&lt;FONT color="#FF0000"&gt;‐Dlog4j2.formatMsgNoLookups=true&lt;/FONT&gt;&lt;/STRONG&gt;&amp;nbsp;-cp "%AT_INFRA_JAR%";"%AT_PLUGINS%"/*;"%AT_EXTERNAL%"/*;"%AT_LIB%"/* %AT_MAIN% %AT_DATA% %AT_PLUGIN_LIST% %*&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;Save the file.&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;Locate the vulnerable log4j-core-&amp;lt;version#&amp;gt;.jar file and rename/move it to ../log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;LI-CODE lang="markup"&gt;$ cd &amp;lt;installation-root&amp;gt;\Enterprise Manager\java\external

$ ren log4j-core-&amp;lt;version#&amp;gt;.jar  ..\log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Download the non-vulnerable jar named&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;log4j-core-nolookup-&amp;lt;version#&amp;gt;.jar&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp; from this page and place it in the same location as the vulnerable jar.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Restart the Enterprise Manager Windows service.&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;$ sc stop AttunityEnterpriseManager&lt;BR /&gt;&lt;BR /&gt;$ sc start AttunityEnterpriseManager&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Note that if you have a customized Enterprise Manager start script, you should perform the equivalent edit on your modified start script.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For more information on the Log4j vulnerability, please visit the &lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_blank" rel="noopener"&gt;Support Updates Blog&lt;/A&gt; post.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 25 Jan 2022 12:48:24 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869994</guid>
      <dc:creator>Jamie_Gregory</dc:creator>
      <dc:date>2022-01-25T12:48:24Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870082#M5020</link>
      <description>&lt;P&gt;Hi - Thanks for the mitigation steps.&lt;/P&gt;
&lt;P&gt;Does this impact the functionality of Enterprise manager in any way?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 23:35:41 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1870082#M5020</guid>
      <dc:creator>Jon_Donker</dc:creator>
      <dc:date>2021-12-13T23:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1872631#M5108</link>
      <description>&lt;P&gt;I found the Analytics service no longer works:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SYS,GENERAL_EXCEPTION,Unable to connect to the remote server&lt;/P&gt;
&lt;P&gt;In log file:&lt;/P&gt;
&lt;P&gt;[Manager ] [ERROR] The Analytics java server could not start.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 12:05:48 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1872631#M5108</guid>
      <dc:creator>GerardQ</dc:creator>
      <dc:date>2021-12-17T12:05:48Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873640#M5144</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please let us know the whether the newly updated mitigation for QEM is working fine or not.?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Antony S&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 08:08:40 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873640#M5144</guid>
      <dc:creator>Antony_05</dc:creator>
      <dc:date>2021-12-21T08:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873719#M5146</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/56730"&gt;@Anthony&lt;/a&gt;, the issue with Analytics service was caused by the minus sign character in the adviced remediation pages. I used copy/paste to add the parameter to the JVM and that caused the error. The issue was resolved after manually typing '-'-sign.&lt;/P&gt;
&lt;P&gt;Regards, Gerard&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 10:17:30 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873719#M5146</guid>
      <dc:creator>GerardQ</dc:creator>
      <dc:date>2021-12-21T10:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873743#M5147</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm getting an error while renaming the log4j.jar file in the QEM.&lt;/P&gt;
&lt;P&gt;ren log4j-core-2.11.1.jar log4j-core-2.11.1.jar-vulnerable&lt;/P&gt;
&lt;P&gt;ERROR:&lt;BR /&gt;The process cannot access the file because it is being used by another process.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Antony S&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 10:59:04 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873743#M5147</guid>
      <dc:creator>Antony_05</dc:creator>
      <dc:date>2021-12-21T10:59:04Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873781#M5148</link>
      <description>&lt;P&gt;Did you stop the service first?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 12:08:46 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873781#M5148</guid>
      <dc:creator>GerardQ</dc:creator>
      <dc:date>2021-12-21T12:08:46Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873865#M5150</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No we did not stop the service first ,we followed the steps as its give in this community. Renaming the Log4j . jar file first when we got this error.Should we stop the Replication first and then rename the jar file&amp;nbsp; followed by replacing it with the new version of jar file provided and then start the Replication again ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 14:44:46 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873865#M5150</guid>
      <dc:creator>Antony_05</dc:creator>
      <dc:date>2021-12-21T14:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873875#M5151</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/128743"&gt;@GerardQ&lt;/a&gt;&amp;nbsp;We also are getting the&amp;nbsp;&lt;SPAN&gt;SYS,GENERAL_EXCEPTION,Unable to connect to the remote server error.&amp;nbsp; We tried editing the file and typing in the "-", stopped and started the services again, but still get that same error&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 14:55:34 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873875#M5151</guid>
      <dc:creator>ChadW</dc:creator>
      <dc:date>2021-12-21T14:55:34Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873876#M5152</link>
      <description>&lt;P&gt;Yes you need to stop the service first.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 14:56:22 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1873876#M5152</guid>
      <dc:creator>GerardQ</dc:creator>
      <dc:date>2021-12-21T14:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1874000#M5153</link>
      <description>&lt;P&gt;We had to apply 2021.5 SR4 for it to work&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 19:45:43 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1874000#M5153</guid>
      <dc:creator>ChadW</dc:creator>
      <dc:date>2021-12-21T19:45:43Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1874021#M5154</link>
      <description>&lt;P&gt;group:&lt;/P&gt;
&lt;P&gt;1. you would need to stop the QEM service first.&lt;BR /&gt;2. when download the log4j-core-nolookup-&amp;amp;lt;version#&amp;amp;gt;.jar , make sure that you use the correct version that you rename .&lt;BR /&gt;3. then you would need to start the QEM service after replacing the log4j-core-nolookup-&amp;amp;lt;version#&amp;amp;gt;.jar file.&lt;/P&gt;
&lt;P&gt;i tested on 7.7 sp9 ( 7.0.0.1566 ) without any issue.&lt;/P&gt;
&lt;P&gt;and 2021.5 sp8 (2021.5.0.498) without any issue.&lt;/P&gt;
&lt;P&gt;NOTES: that if you were on 7.7xx and already apply the nolookup jar file . then you upgrade to 2021.5xx kit. you would need to redo all the steps again.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 22:25:55 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1874021#M5154</guid>
      <dc:creator>Steve_Nguyen</dc:creator>
      <dc:date>2021-12-21T22:25:55Z</dc:date>
    </item>
    <item>
      <title>Re: CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Enterprise Manager</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1874080#M5157</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;As you mentioned, I tried the full process again after stopping the QEM service. But I'm facing the same error.&lt;/P&gt;
&lt;P&gt;ERROR:&lt;BR /&gt;The process cannot access the file because it is being used by another process.&lt;/P&gt;
&lt;P&gt;And the QEM version that I'm using is (Version 7.0.0.461)&lt;/P&gt;
&lt;P&gt;Thanks,&lt;BR /&gt;Antony S&lt;/P&gt;</description>
      <pubDate>Wed, 22 Dec 2021 06:48:02 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/tac-p/1874080#M5157</guid>
      <dc:creator>Antony_05</dc:creator>
      <dc:date>2021-12-22T06:48:02Z</dc:date>
    </item>
  </channel>
</rss>

