9.9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.3 High
AI Score
Confidence
High
0.92 High
EPSS
Percentile
99.0%
An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the backend server hosting the repository application. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.
Recent assessments:
ccondon-r7 at January 29, 2024 9:16pm UTC reported:
Rapid7 saw exploitation of this in customer environments in early December 2023. Itβs also been used by the Cactus ransomware group.
Assessed Attacker Value: 4
Assessed Attacker Value: 4Assessed Attacker Value: 0
community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801
community.qlik.com/t5/Release-Notes/tkb-p/ReleaseNotes
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41265
github.com/praetorian-inc/zeroqlik-detect
www.praetorian.com/blog/doubleqlik-bypassing-the-original-fix-for-cve-2023-41265/
9.9 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
9.3 High
AI Score
Confidence
High
0.92 High
EPSS
Percentile
99.0%