Unlock a world of possibilities! Login now and discover the exclusive benefits awaiting you.
Hi All,
We are currently on May 2023 Patch10 version with Postgres12.
Understand from our security team that there are the below two vulnerabilities for Postgres
This vulnerability exists in pgAdmin, specifically inside the /settings/store API response json payload. Exploiting this vulnerability could allow a threat actor to execute malicious script on the client end and steal sensitive cookies.
This vulnerability affects pgAdmin, which could allow a threat actor to bypass multi-factor authentication on affected versions.
Is anyone aware if it affect Qlik Sense enterprise on windows?
Thanks & Regards
Amar Shedage
@amarvilass what specific version of Postgres are you using and is it bundled/unbundled?
It is the bundled version postgres 12.5 that comes with default with the old version Feb 2022 version.
Thanks & Regards
Amar
It looks like this vulnerability only affects PgAdmin. PgAdmin is not installed by Qlik. It is only used if you do changes in the database.
Thanks @Maria_Halley
The reason I was checking this is to resolve an issue with Qlik due to a custom properties being duplicated and injected multiple times after Qlik upgrade. This issue causes the jobs to fail even though the status reflect as successful. The job failure is causing the AD sync job to fail and not add new users. The solution to this lies in the below link
The solution proposed from Qlik needs the PgAdmin to be used to remove the duplicate properties. Will you be able to suggest if this will cause any issue?
Thanks & Regards
Amar