<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Security Fixes in Qlik GeoAnalytics server in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/Security-Fixes-in-Qlik-GeoAnalytics-server/ta-p/1947554</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;Executive Summary&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;A number of security issues in Qlik GeoAnalytics Server have been identified and patched. If successfully exploited, these issues could lead to unauthorized information disclosure from the server running GeoAnalytics or unauthorized client-side code running in the context of users.&lt;/P&gt;
&lt;P&gt;These issues were found as part of the Qlik secure engineering program and no reports of them being exploited have been received.&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;Affected Software&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;All Qlik GeoAnalytics server versions &lt;STRONG&gt;prior &lt;/STRONG&gt;to these releases are impacted:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;May 2022 SR1&lt;/LI&gt;
&lt;LI&gt;February 2022 SR1&lt;/LI&gt;
&lt;LI&gt;November 2021 SR4&lt;/LI&gt;
&lt;LI&gt;May 2021 SR3&lt;/LI&gt;
&lt;LI&gt;February 2021 SR3&lt;/LI&gt;
&lt;LI&gt;November 2020 SR3&lt;/LI&gt;
&lt;LI&gt;September 2020 SR3&lt;/LI&gt;
&lt;LI&gt;June 2020 SR3&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;Severity Rating&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;Three vulnerabilities are rated as &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;high &lt;/STRONG&gt;&lt;/FONT&gt;due to the possibility of information disclosure impacting the server running GeoAnalytics. One is rated as &lt;FONT color="#FF9900"&gt;&lt;STRONG&gt;medium &lt;/STRONG&gt;&lt;/FONT&gt;as it allows client-side script injection. See below for the scoring breakdown.&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;Vulnerability Details&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;SPAN&gt;QB-10651 - Path traversal vulnerability in GeoAnalytics Server&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;Severity: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N &lt;STRONG&gt;(7.5 High)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Due to improper validation of user-supplied input, a malicious user may be able access files on the server that they should not have access to.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;SPAN&gt;QB-10518 - Server Side Request Forgery (SSRF) in Maps&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;Severity: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N &lt;STRONG&gt;(7.6 High)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Due to improper validation of user-supplied input, a user may be able access resources within a network in the context of the service account running the GeoAnalytics service.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;SPAN&gt;QB-10519 - Javascript Injection. Maps (High).&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;Severity: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N &lt;STRONG&gt;(7.5 High)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Due to improper validation of user-supplied input, a malicious user may be able inject client-side scripts that are run in the context of another user.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;SPAN&gt;QB-10517 - Reflected Cross-site Scripting (XSS) &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;Severity: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N &lt;STRONG&gt;(5.8 Medium)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Due to improper validation of user-supplied input, an attacker may be able to craft a URL, which if another user visits, causes client-side scripts to be run in the context of that user.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;SPAN&gt;Resolution / Recommendation&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;It is recommended to upgrade Qlik GeoAnalytics server to a version containing fixes. The first versions with the fixes are:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;May 2022 SR1&lt;/LI&gt;
&lt;LI&gt;February 2022 SR1&lt;/LI&gt;
&lt;LI&gt;November 2021 SR4&lt;/LI&gt;
&lt;LI&gt;May 2021 SR3&lt;/LI&gt;
&lt;LI&gt;February 2021 SR3&lt;/LI&gt;
&lt;LI&gt;November 2020 SR3&lt;/LI&gt;
&lt;LI&gt;September 2020 SR3&lt;/LI&gt;
&lt;LI&gt;June 2020 SR3&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;All Qlik software can be downloaded from our official &lt;A href="https://community.qlik.com/t5/Downloads/tkb-p/Downloads" target="_blank" rel="noopener"&gt;Qlik Download page&lt;/A&gt; (customer login required).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 05 Jul 2022 12:48:12 GMT</pubDate>
    <dc:creator>Katie_Davis</dc:creator>
    <dc:date>2022-07-05T12:48:12Z</dc:date>
    <item>
      <title>Security Fixes in Qlik GeoAnalytics server</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Security-Fixes-in-Qlik-GeoAnalytics-server/ta-p/1947554</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;Executive Summary&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;A number of security issues in Qlik GeoAnalytics Server have been identified and patched. If successfully exploited, these issues could lead to unauthorized information disclosure from the server running GeoAnalytics or unauthorized client-side code running in the context of users.&lt;/P&gt;
&lt;P&gt;These issues were found as part of the Qlik secure engineering program and no reports of them being exploited have been received.&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;Affected Software&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;All Qlik GeoAnalytics server versions &lt;STRONG&gt;prior &lt;/STRONG&gt;to these releases are impacted:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;May 2022 SR1&lt;/LI&gt;
&lt;LI&gt;February 2022 SR1&lt;/LI&gt;
&lt;LI&gt;November 2021 SR4&lt;/LI&gt;
&lt;LI&gt;May 2021 SR3&lt;/LI&gt;
&lt;LI&gt;February 2021 SR3&lt;/LI&gt;
&lt;LI&gt;November 2020 SR3&lt;/LI&gt;
&lt;LI&gt;September 2020 SR3&lt;/LI&gt;
&lt;LI&gt;June 2020 SR3&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;Severity Rating&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;Three vulnerabilities are rated as &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;high &lt;/STRONG&gt;&lt;/FONT&gt;due to the possibility of information disclosure impacting the server running GeoAnalytics. One is rated as &lt;FONT color="#FF9900"&gt;&lt;STRONG&gt;medium &lt;/STRONG&gt;&lt;/FONT&gt;as it allows client-side script injection. See below for the scoring breakdown.&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;Vulnerability Details&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;SPAN&gt;QB-10651 - Path traversal vulnerability in GeoAnalytics Server&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;Severity: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N &lt;STRONG&gt;(7.5 High)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Due to improper validation of user-supplied input, a malicious user may be able access files on the server that they should not have access to.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;SPAN&gt;QB-10518 - Server Side Request Forgery (SSRF) in Maps&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;Severity: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N &lt;STRONG&gt;(7.6 High)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Due to improper validation of user-supplied input, a user may be able access resources within a network in the context of the service account running the GeoAnalytics service.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;SPAN&gt;QB-10519 - Javascript Injection. Maps (High).&lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;Severity: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N &lt;STRONG&gt;(7.5 High)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Due to improper validation of user-supplied input, a malicious user may be able inject client-side scripts that are run in the context of another user.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#339966"&gt;&lt;SPAN&gt;QB-10517 - Reflected Cross-site Scripting (XSS) &lt;/SPAN&gt;&lt;/FONT&gt;&lt;BR /&gt;Severity: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N &lt;STRONG&gt;(5.8 Medium)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;Due to improper validation of user-supplied input, an attacker may be able to craft a URL, which if another user visits, causes client-side scripts to be run in the context of that user.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;SPAN&gt;Resolution / Recommendation&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;It is recommended to upgrade Qlik GeoAnalytics server to a version containing fixes. The first versions with the fixes are:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;May 2022 SR1&lt;/LI&gt;
&lt;LI&gt;February 2022 SR1&lt;/LI&gt;
&lt;LI&gt;November 2021 SR4&lt;/LI&gt;
&lt;LI&gt;May 2021 SR3&lt;/LI&gt;
&lt;LI&gt;February 2021 SR3&lt;/LI&gt;
&lt;LI&gt;November 2020 SR3&lt;/LI&gt;
&lt;LI&gt;September 2020 SR3&lt;/LI&gt;
&lt;LI&gt;June 2020 SR3&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;All Qlik software can be downloaded from our official &lt;A href="https://community.qlik.com/t5/Downloads/tkb-p/Downloads" target="_blank" rel="noopener"&gt;Qlik Download page&lt;/A&gt; (customer login required).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 05 Jul 2022 12:48:12 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Security-Fixes-in-Qlik-GeoAnalytics-server/ta-p/1947554</guid>
      <dc:creator>Katie_Davis</dc:creator>
      <dc:date>2022-07-05T12:48:12Z</dc:date>
    </item>
    <item>
      <title>Re: Security Fixes in Qlik GeoAnalytics server</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Security-Fixes-in-Qlik-GeoAnalytics-server/tac-p/1949404#M6763</link>
      <description>&lt;P&gt;Can you please elaborate on the vulnerable versions as&amp;nbsp;the wording here a bit ambiguous, when you say “versions prior to these releases”&lt;/P&gt;
&lt;P&gt;for November 2021 SR4, does that mean November 2021 SR1-3 are all vulnerable?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jun 2022 22:17:19 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Security-Fixes-in-Qlik-GeoAnalytics-server/tac-p/1949404#M6763</guid>
      <dc:creator>AdamJohnson</dc:creator>
      <dc:date>2022-06-28T22:17:19Z</dc:date>
    </item>
    <item>
      <title>Re: Security Fixes in Qlik GeoAnalytics server</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/Security-Fixes-in-Qlik-GeoAnalytics-server/tac-p/1951811#M6802</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/152515"&gt;@AdamJohnson&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Versions prior to them will be affected, yes. So SR4 indicates prior SRs are affected (initial release to SR3, etc).&lt;/P&gt;
&lt;P&gt;All the best,&lt;BR /&gt;Sonja&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jul 2022 12:49:32 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/Security-Fixes-in-Qlik-GeoAnalytics-server/tac-p/1951811#M6802</guid>
      <dc:creator>Sonja_Bauernfeind</dc:creator>
      <dc:date>2022-07-05T12:49:32Z</dc:date>
    </item>
  </channel>
</rss>

