Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-41265

CVSS 9.6 · Critical KEV · Ransomware EPSS 92.41% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-41265

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the backend server hosting the repository application. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Qlik Sense 环境问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Qlik Sense是美国Qlik公司的一个应用程序。允许用户为本地和离线使用创建可视化、图表、交互式仪表板和分析应用程序。 Qlik Sense Enterprise for Windows存在安全漏洞。攻击者利用该漏洞可以提升权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2023-41265

#POC DescriptionSource LinkShenlong Link
1A Nuclei template to detect ZeroQlik (CVE-2023-41265 and CVE-2023-41266)https://github.com/praetorian-inc/zeroqlik-detectPOC Details
2An HTTP Request Tunneling vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows a remote attacker to elevate their privilege by tunneling HTTP requests in the raw HTTP request. This allows them to send requests that get executed by the backend server hosting the repository application. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-41265.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-41265

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-08-29 · 28 CVEs total

CVE-2023-340399.8 CRITICALVMware Aria Operations 加密问题漏洞
CVE-2023-412668.2 HIGHQlik Sense 输入验证错误漏洞
CVE-2023-208907.2 HIGHVMware Aria Operations 路径遍历漏洞
CVE-2023-46117.0 HIGHUse after free race between mbind() and vma-locked page fault
CVE-2023-38971Badaso 跨站脚本漏洞
CVE-2023-38975Qdrant 安全漏洞
CVE-2023-41153Webmin Usermin 跨站脚本漏洞
CVE-2020-18912Earcms 代码问题漏洞
CVE-2023-39558Audimex AG AudimexEE 跨站脚本漏洞
CVE-2023-39559Audimex AG AudimexEE 路径遍历漏洞
CVE-2021-3262TripSpark VEO SQL注入漏洞
CVE-2023-39663MathJax 安全漏洞
CVE-2023-39678BDCOM OLT P3310D-2AC 跨站脚本漏洞
CVE-2023-38283OpenBSD 代码问题漏洞
CVE-2023-38802FRRouting FRR 安全漏洞
CVE-2023-41362MyBB 代码注入漏洞
CVE-2023-41376Nokia Service Router Operating System 安全漏洞
CVE-2023-39615libxml2 缓冲区错误漏洞
CVE-2023-39616AOMedia 缓冲区错误漏洞
CVE-2023-40889ZBar 缓冲区错误漏洞

Showing top 20 of 28 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-41265

No comments yet


Leave a comment