<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Vulnerability Concern: Username and password sent in plain text in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/ta-p/1735010</link>
    <description>&lt;DIV class="lia-message-template-symptoms-zone"&gt;
&lt;P&gt;A penetration test shows traffic traces between a client device and a server that reveals the user's credentials. This might be flagged as a potential risk for man-in-the-middle (MITM) attacks in a security report.&lt;/P&gt;
&lt;P&gt;Below images show an example of a login request through Qlik Sense form login, where the HTTP request body contains the user's credentials in plain text.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FormLoginHTTPHeader.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/38846i7960B34EFDBE97B6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="FormLoginHTTPHeader.png" alt="FormLoginHTTPHeader.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FormLoginHTTPBody.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/38847i873C0A9D0ED55FCA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="FormLoginHTTPBody.png" alt="FormLoginHTTPBody.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-diagnosis-zone"&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Diagnosis&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;In this scenario, the end-user typically enters credentials into a form on a login page. The login form usually hides the password from plain sight by masking it on the screen, but the&amp;nbsp;entries are still plain text.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The communication between the client browser and server should be secured and encrypted with HTTPS so that the plain text credentials and any other content are encrypted at all times during transport between the client device and server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An attacker does not have the required certificates, and can therefore not decrypt intercepted HTTPS traffic and the server reveal the content.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This test result is a false-positive since the penetration tool, in this case, acts as the connecting and trusted client, and thereby decrypts the traffic and consequently can also display and analyze the traffic content.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Qlik Sense on Windows defaults to HTTPS. All communication is under TLS. When a user is attempted to log in, the web browser establishes a TLS connection with the server and is able to view requests in plain text (in the browser). This does not mean the request has gone out into the world without encryption. From the provided screenshots, the target URL is omitted. I'm unable to verify if the scheme in the browser is HTTP or HTTPS (as seen in the below screenshot)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-06-15 at 10.52.07 AM.png" style="width: 296px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/57326i8216556F795FBAD3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2021-06-15 at 10.52.07 AM.png" alt="Screen Shot 2021-06-15 at 10.52.07 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;A change to your environment would require you to communicate with your support in order to reset the proxy to the default configuration.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-solution-zone"&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Solution&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;Enforce HTTPS on all access to the server-side.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Based on the above this is not deemed to be a security vulnerability by the SSO team. This has gone through other auditors and has never reported as a security concern.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;References&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;Wikipedia:&amp;nbsp;&amp;nbsp;Man-in-the-middle attack&amp;nbsp;&lt;BR /&gt;&lt;A href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack" target="_blank" rel="noopener"&gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Wikipedia:&amp;nbsp;False positives and false negatives&lt;BR /&gt;&lt;A href="https://en.wikipedia.org/wiki/False_positives_and_false_negatives" target="_blank" rel="noopener"&gt;https://en.wikipedia.org/wiki/False_positives_and_false_negatives&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
    <pubDate>Mon, 20 Feb 2023 08:50:41 GMT</pubDate>
    <dc:creator>ToniKautto</dc:creator>
    <dc:date>2023-02-20T08:50:41Z</dc:date>
    <item>
      <title>Vulnerability Concern: Username and password sent in plain text</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/ta-p/1735010</link>
      <description>&lt;DIV class="lia-message-template-symptoms-zone"&gt;
&lt;P&gt;A penetration test shows traffic traces between a client device and a server that reveals the user's credentials. This might be flagged as a potential risk for man-in-the-middle (MITM) attacks in a security report.&lt;/P&gt;
&lt;P&gt;Below images show an example of a login request through Qlik Sense form login, where the HTTP request body contains the user's credentials in plain text.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FormLoginHTTPHeader.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/38846i7960B34EFDBE97B6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="FormLoginHTTPHeader.png" alt="FormLoginHTTPHeader.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FormLoginHTTPBody.png" style="width: 400px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/38847i873C0A9D0ED55FCA/image-size/medium?v=v2&amp;amp;px=400" role="button" title="FormLoginHTTPBody.png" alt="FormLoginHTTPBody.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-diagnosis-zone"&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Diagnosis&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;In this scenario, the end-user typically enters credentials into a form on a login page. The login form usually hides the password from plain sight by masking it on the screen, but the&amp;nbsp;entries are still plain text.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The communication between the client browser and server should be secured and encrypted with HTTPS so that the plain text credentials and any other content are encrypted at all times during transport between the client device and server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An attacker does not have the required certificates, and can therefore not decrypt intercepted HTTPS traffic and the server reveal the content.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This test result is a false-positive since the penetration tool, in this case, acts as the connecting and trusted client, and thereby decrypts the traffic and consequently can also display and analyze the traffic content.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Qlik Sense on Windows defaults to HTTPS. All communication is under TLS. When a user is attempted to log in, the web browser establishes a TLS connection with the server and is able to view requests in plain text (in the browser). This does not mean the request has gone out into the world without encryption. From the provided screenshots, the target URL is omitted. I'm unable to verify if the scheme in the browser is HTTP or HTTPS (as seen in the below screenshot)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2021-06-15 at 10.52.07 AM.png" style="width: 296px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/57326i8216556F795FBAD3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2021-06-15 at 10.52.07 AM.png" alt="Screen Shot 2021-06-15 at 10.52.07 AM.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;A change to your environment would require you to communicate with your support in order to reset the proxy to the default configuration.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-solution-zone"&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Solution&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;Enforce HTTPS on all access to the server-side.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Based on the above this is not deemed to be a security vulnerability by the SSO team. This has gone through other auditors and has never reported as a security concern.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;References&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;Wikipedia:&amp;nbsp;&amp;nbsp;Man-in-the-middle attack&amp;nbsp;&lt;BR /&gt;&lt;A href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack" target="_blank" rel="noopener"&gt;https://en.wikipedia.org/wiki/Man-in-the-middle_attack&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Wikipedia:&amp;nbsp;False positives and false negatives&lt;BR /&gt;&lt;A href="https://en.wikipedia.org/wiki/False_positives_and_false_negatives" target="_blank" rel="noopener"&gt;https://en.wikipedia.org/wiki/False_positives_and_false_negatives&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
      <pubDate>Mon, 20 Feb 2023 08:50:41 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/ta-p/1735010</guid>
      <dc:creator>ToniKautto</dc:creator>
      <dc:date>2023-02-20T08:50:41Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Concern: Username and password sent in plain text</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/1998991#M7657</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/35546"&gt;@ToniKautto&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any approach where we can hide the plain text paaswords?&lt;/P&gt;
&lt;P&gt;Currently it is breaching our security policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Rohit Gharat&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 10:59:20 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/1998991#M7657</guid>
      <dc:creator>_rohitgharat</dc:creator>
      <dc:date>2022-11-01T10:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Concern: Username and password sent in plain text</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/1998992#M7658</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/45381"&gt;@_rohitgharat&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me get in touch with our engineers to verify the article.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 11:08:21 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/1998992#M7658</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2022-11-01T11:08:21Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Concern: Username and password sent in plain text</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/1999512#M7673</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/45381"&gt;@_rohitgharat&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have run this by our security office and the recommendation in the article remains the solution to this question.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 10:48:25 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/1999512#M7673</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2022-11-02T10:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Concern: Username and password sent in plain text</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/2034264#M8311</link>
      <description>&lt;P&gt;Hi, &lt;BR /&gt;Is this article also relevant for Qlik Alerting on Windows?&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;/P&gt;
&lt;P&gt;Lucky&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 04:28:56 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/2034264#M8311</guid>
      <dc:creator>Luck</dc:creator>
      <dc:date>2023-02-06T04:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Concern: Username and password sent in plain text</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/2034299#M8313</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/125268"&gt;@Luck&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is not a Qlik-specific issue and generally applies to any unsecured connection (HTTP vs HTTPS) which is used to transport passwords. Though I believe Qlik Alerting does not submit passwords. Should you locate what you believe to be a security issue, please submit a ticket with Support so it can be correctly analyzed.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 08:01:02 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/2034299#M8313</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2023-02-06T08:01:02Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Concern: Username and password sent in plain text</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/2039512#M8436</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/28597"&gt;@Sonja_Bauernfeind&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;I've submitted a ticket, but from the response we get by Support, it is deemed the same in Qlik Alerting (reported for QlikSense &amp;amp; Alerting).&lt;/P&gt;
&lt;P&gt;Could we get a proof document from the solution mentioned above :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"Based on the above this is not deemed to be a security vulnerability by the SSO team. This has gone through other auditors and has never reported as a security concern."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;From which auditors did the report on the above test come from? &lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Could share the report from the auditors on the above &amp;amp; does not deem this as a security concern?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Lucky&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 04:16:14 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/2039512#M8436</guid>
      <dc:creator>Luck</dc:creator>
      <dc:date>2023-02-18T04:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Concern: Username and password sent in plain text</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/2039720#M8438</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/125268"&gt;@Luck&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please send me the ticket number you submitted in direct messages. As this will need to be handled by our security office and I cannot provide you with assistance on this article.&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Feb 2023 07:59:31 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/2039720#M8438</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2023-02-20T07:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Concern: Username and password sent in plain text</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/2122806#M10298</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/35546"&gt;@ToniKautto&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/125268"&gt;@Luck&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/45381"&gt;@_rohitgharat&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/28597"&gt;@Sonja_Bauernfeind&lt;/a&gt;&amp;nbsp;, can you confirm if this is applicable for Qlik Replicate as well ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"Based on the above this is not deemed to be a security vulnerability by the SSO team. This has gone through other auditors and has never reported as a security concern."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We too have same issue, our security auditor mentioned the same, sensitive data is in plain text.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2023 06:26:53 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/2122806#M10298</guid>
      <dc:creator>rahulmagotra</dc:creator>
      <dc:date>2023-09-27T06:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Concern: Username and password sent in plain text</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/2124254#M10332</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/186514"&gt;@rahulmagotra&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Enforcing HTTPS on all access to the server-side will encrypt traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This test result is a &lt;STRONG&gt;false-positive&lt;/STRONG&gt; since the penetration tool, in this case, &lt;STRONG&gt;acts as the connecting and trusted client&lt;/STRONG&gt;, and &lt;STRONG&gt;thereby decrypts the traffic and consequently can also display and analyze the traffic content&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Oct 2023 10:19:01 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Vulnerability-Concern-Username-and-password-sent-in-plain-text/tac-p/2124254#M10332</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2023-10-02T10:19:01Z</dc:date>
    </item>
  </channel>
</rss>

