alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"ET WEB_SPECIFIC_APPS Possible DoubleQlik RCE via Path Traversal (CVE-2023-41266)"; flow:established,to_server; http.method; content:"POST"; http.header; content:"X-Qlik-"; fast_pattern; http.uri.raw; content:"/resources/qmc/fonts/"; startswith; content:".ttf"; endswith; reference:url,praetorian.com/blog/doubleqlik-bypassing-the-original-fix-for-cve-2023-41265/; reference:cve,2023-41266; classtype:web-application-attack; sid:2048366; rev:1; metadata:affected_product Qlik_Sense_Enterprise, attack_target Client_Endpoint, created_at 2023_09_29, cve CVE_2023_41266, deployment Perimeter, former_category WEB_SPECIFIC_APPS, signature_severity Major, updated_at 2023_09_29, reviewed_at 2023_09_29;)
Metadata | |
---|
affected_product | Qlik_Sense_Enterprise |
attack_target | Client_Endpoint |
created_at | 2023_09_29 |
cve | CVE_2023_41266 |
deployment | Perimeter |
former_category | WEB_SPECIFIC_APPS |
signature_severity | Major |
updated_at | 2023_09_29 |
reviewed_at | 2023_09_29 |