ET WEB_SPECIFIC_APPS Possible DoubleQlik RCE via HTTP Request Tunneling Payload (CVE-2023-41265)Source: et/open
alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET WEB_SPECIFIC_APPS Possible DoubleQlik RCE via HTTP Request Tunneling Payload (CVE-2023-41265)"; flow:established,to_server; http.method; content:"POST"; http.header; content:"X-Qlik-"; fast_pattern;http.content_len; content:"0"; bsize:1; endswith; http.request_body; bsize:>0; reference:url,praetorian.com/blog/qlik-sense-technical-exploit/; reference:cve,2023-41265; reference:url,praetorian.com/blog/doubleqlik-bypassing-the-original-fix-for-cve-2023-41265/; classtype:web-application-attack; sid:2048365; rev:1; metadata:affected_product Windows_XP_Vista_7_8_10_Server_32_64_Bit, affected_product Qlik_Sense_Enterprise, attack_target Client_Endpoint, created_at 2023_09_29, cve CVE_2023_41265, deployment Perimeter, former_category WEB_SPECIFIC_APPS, signature_severity Major, updated_at 2023_09_29, reviewed_at 2023_09_29;)
Reference
URLhttp://praetorian.com/blog/qlik-sense-technical-exploit/
CVECVE-2023-41265
URLhttp://praetorian.com/blog/doubleqlik-bypassing-the-original-fix-for-cve-2023-41265/
Metadata
affected_productWindows_XP_Vista_7_8_10_Server_32_64_Bit
affected_productQlik_Sense_Enterprise
attack_targetClient_Endpoint
created_at2023_09_29
cveCVE_2023_41265
deploymentPerimeter
former_categoryWEB_SPECIFIC_APPS
signature_severityMajor
updated_at2023_09_29
reviewed_at2023_09_29