ET WEB_SPECIFIC_APPS Possible DoubleQlik RCE via Path Traversal (CVE-2023-41266)Source: et/open
alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET WEB_SPECIFIC_APPS Possible DoubleQlik RCE via Path Traversal (CVE-2023-41266)"; flow:established,to_server; http.method; content:"POST"; http.header; content:"X-Qlik-"; fast_pattern; http.uri.raw; content:"/resources/qmc/fonts/"; startswith; content:".ttf"; endswith; reference:url,praetorian.com/blog/doubleqlik-bypassing-the-original-fix-for-cve-2023-41265/; reference:cve,2023-41266; classtype:web-application-attack; sid:2048366; rev:1; metadata:affected_product Qlik_Sense_Enterprise, attack_target Client_Endpoint, created_at 2023_09_29, cve CVE_2023_41266, deployment Perimeter, former_category WEB_SPECIFIC_APPS, signature_severity Major, updated_at 2023_09_29, reviewed_at 2023_09_29;)
Reference
URLhttp://praetorian.com/blog/doubleqlik-bypassing-the-original-fix-for-cve-2023-41265/
CVECVE-2023-41266
Metadata
affected_productQlik_Sense_Enterprise
attack_targetClient_Endpoint
created_at2023_09_29
cveCVE_2023_41266
deploymentPerimeter
former_categoryWEB_SPECIFIC_APPS
signature_severityMajor
updated_at2023_09_29
reviewed_at2023_09_29