alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET WEB_SPECIFIC_APPS Possible DoubleQlik RCE via HTTP Request Tunneling Payload (CVE-2023-41265)"; flow:established,to_server; http.method; content:"POST"; http.header; content:"X-Qlik-"; fast_pattern;http.content_len; content:"0"; bsize:1; endswith; http.request_body; bsize:>0; reference:url,praetorian.com/blog/qlik-sense-technical-exploit/; reference:cve,2023-41265; reference:url,praetorian.com/blog/doubleqlik-bypassing-the-original-fix-for-cve-2023-41265/; classtype:web-application-attack; sid:2048365; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, affected_product Qlik_Sense_Enterprise, attack_target Client_Endpoint, created_at 2023_09_29, cve CVE_2023_41265, deployment Perimeter, former_category WEB_SPECIFIC_APPS, signature_severity Major, updated_at 2023_09_29, reviewed_at 2023_09_29;)
Metadata | |
---|
affected_product | Windows_XP_Vista_7_8_10_Server_32_64_Bit |
affected_product | Qlik_Sense_Enterprise |
attack_target | Client_Endpoint |
created_at | 2023_09_29 |
cve | CVE_2023_41265 |
deployment | Perimeter |
former_category | WEB_SPECIFIC_APPS |
signature_severity | Major |
updated_at | 2023_09_29 |
reviewed_at | 2023_09_29 |