CVE-2023-41266 (GCVE-0-2023-41266)
Vulnerability from cvelistv5 – Published: 2023-08-29 00:00 – Updated: 2025-10-30 15:32
VLAI?
CISA
Summary
A path traversal vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows an unauthenticated remote attacker to generate an anonymous session. This allows them to transmit HTTP requests to unauthorized endpoints. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.
Severity ?
8.2 (High)
CWE
- n/a
Assigner
References
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2023-12-07
Due date: 2023-12-28
Required action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.
Used in ransomware: Known
Notes: https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41266
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_12:*:*:enterprise:windows:*:*"
],
"defaultStatus": "unknown",
"product": "qlik_sense",
"vendor": "qlik",
"versions": [
{
"lessThanOrEqual": "august_2022",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:qlik:qlik_sense:may_2023:patch3:*:*:enterprise:windows:*:*"
],
"defaultStatus": "unknown",
"product": "qlik_sense",
"vendor": "qlik",
"versions": [
{
"lessThanOrEqual": "may_2023",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_7:*:*:enterprise:windows:*:*"
],
"defaultStatus": "unknown",
"product": "qlik_sense",
"vendor": "qlik",
"versions": [
{
"lessThanOrEqual": "february_2023",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_10:*:*:enterprise:windows:*:*"
],
"defaultStatus": "unknown",
"product": "qlik_sense",
"vendor": "qlik",
"versions": [
{
"lessThanOrEqual": "november_2022",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-41266",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-23T04:01:03.822744Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2023-12-07",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41266"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-30T15:32:22.573Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41266"
}
],
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:54:04.991Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://community.qlik.com/t5/Release-Notes/tkb-p/ReleaseNotes"
},
{
"tags": [
"x_transferred"
],
"url": "https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows an unauthenticated remote attacker to generate an anonymous session. This allows them to transmit HTTP requests to unauthorized endpoints. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:L/AV:N/A:N/C:H/I:L/PR:N/S:U/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-29T22:34:56.594Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://community.qlik.com/t5/Release-Notes/tkb-p/ReleaseNotes"
},
{
"url": "https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2023-41266",
"datePublished": "2023-08-29T00:00:00.000Z",
"dateReserved": "2023-08-25T00:00:00.000Z",
"dateUpdated": "2025-10-30T15:32:22.573Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2023-41266",
"cwes": "[\"CWE-20\"]",
"dateAdded": "2023-12-07",
"dueDate": "2023-12-28",
"knownRansomwareCampaignUse": "Known",
"notes": "https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801 ; https://nvd.nist.gov/vuln/detail/CVE-2023-41266",
"product": "Sense",
"requiredAction": "Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.",
"shortDescription": "Qlik Sense contains a path traversal vulnerability that allows a remote, unauthenticated attacker to create an anonymous session by sending maliciously crafted HTTP requests. This anonymous session could allow the attacker to send further requests to unauthorized endpoints.",
"vendorProject": "Qlik",
"vulnerabilityName": "Qlik Sense Path Traversal Vulnerability"
},
"fkie_nvd": {
"cisaActionDue": "2023-12-28",
"cisaExploitAdd": "2023-12-07",
"cisaRequiredAction": "Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.",
"cisaVulnerabilityName": "Qlik Sense Path Traversal Vulnerability",
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:august_2022:-:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"41AEA1CA-D344-48DB-92D8-05D0EDC8487D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_1:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"FC12BB7A-366F-4EE2-AABF-19E83B5B9EC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_10:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"5F601CFC-70D0-450B-AE49-058E6B887E15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_11:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"17E7F947-3322-46BB-9B89-689F1B792D89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_12:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"37AF6E89-73F0-49E8-82F4-08084A5EBE2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_2:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"E4C7CBBB-C6A0-460E-95DC-C1855826C7F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_3:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"BD491E32-270C-452B-AC1E-FB8F509B916E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_4:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"EDE2809B-4234-443E-9E6A-6B402D258617\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_5:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"155F0D6F-2E4A-40E7-9145-7D130334466B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_6:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"D733F495-E0EF-4F25-8532-2773415EFB8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_7:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"578092D7-0F52-45C1-B7E2-FC5AF86AB8ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_8:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"1B3164BA-0BDB-41F9-B51C-4FB0489A125A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_9:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"E0D31C35-50DC-4CDF-AFD4-311EAF5BBBD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:february_2023:-:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"95BBBA68-269F-4385-9D14-A736F2CD707E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_1:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"E6E1046C-35F4-451A-BFF1-2FC6EB01B547\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_2:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"D9AB037B-EE88-47CD-B387-42651CBAAFF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_3:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"3D28B87A-B36A-428E-A93B-255CFD62036F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_4:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"9AD961D6-A315-493C-926F-1441E51C1742\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_5:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"1EFEBD77-7968-4649-8E9B-DAB24DC36E64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_6:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"E6D033E6-C022-4C6B-9EAC-95ABF6CA9BA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_7:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"761B402F-4E98-46A4-A8E3-87F167CF01D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:may_2023:-:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"9E7034FB-5E64-47AD-B4A4-8428474C48C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:may_2023:patch_1:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"29158A06-3DE9-487B-9BC5-B4A690864F4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:may_2023:patch_2:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"272C2CFE-0D8E-46CE-92B6-2BA8658C951B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:may_2023:patch3:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"039E4C03-89CA-4E77-8D79-39D22E85A299\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:november_2022:-:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"72D56C24-9CEF-486B-8E46-6111D7B1676A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_1:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"338E52B2-AD7D-43F3-B707-E0E5976B269E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_10:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"D216C67A-F124-49F0-90EA-B0C8B663D760\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_2:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"FA68ADC7-9E20-4BD3-9235-6D76D4519512\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_3:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"B41A9B8C-FAD3-46F1-8973-DF1FA408064B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_4:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"EE23F5BD-579C-488D-965A-AE916C32976A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_5:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"E9C90120-93D1-43B0-B541-F07EB8FD44EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_6:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"450F236B-4673-403C-9E23-736C0ED92F6E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_7:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"D5E431DE-26E2-4DA2-AD0B-1479D0C95B98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_8:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"0D6F6570-970B-4E49-9D92-65FAFCC71360\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_9:*:*:enterprise:windows:*:*\", \"matchCriteriaId\": \"38116465-3485-44D3-9097-F2C821D8278F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A path traversal vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows an unauthenticated remote attacker to generate an anonymous session. This allows them to transmit HTTP requests to unauthorized endpoints. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de limitaci\\u00f3n incorrecta de una ruta a un directorio restringido (path traversal) detectada en Qlik Sense Enterprise para Windows, para las versiones Mayo 2023 Parche 3 y anteriores, Febrero 2023 Parche 7 y anteriores, Noviembre 2022 Parche 10 y anteriores, y Agosto 2022 Parche 12 y anteriores, permite a un atacante remoto no autenticado generar una sesi\\u00f3n an\\u00f3nima. Esto le permite transmitir peticiones HTTP a endpoints no autorizados. Esto se ha corregido en la IR de Agosto de 2023, el Parche 4 de Mayo de 2023, el Parche 8 de febrero de 2023, el Parche 11 de Noviembre de 2022 y el Parche 13 de Agosto de 2022.\"}]",
"id": "CVE-2023-41266",
"lastModified": "2024-11-29T14:36:05.433",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"cve@mitre.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N\", \"baseScore\": 8.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 4.2}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 2.5}]}",
"published": "2023-08-29T23:15:09.380",
"references": "[{\"url\": \"https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://community.qlik.com/t5/Release-Notes/tkb-p/ReleaseNotes\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\"]}, {\"url\": \"https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://community.qlik.com/t5/Release-Notes/tkb-p/ReleaseNotes\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-41266\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-08-29T23:15:09.380\",\"lastModified\":\"2025-10-31T14:42:55.363\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A path traversal vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows an unauthenticated remote attacker to generate an anonymous session. This allows them to transmit HTTP requests to unauthorized endpoints. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de limitaci\u00f3n incorrecta de una ruta a un directorio restringido (path traversal) detectada en Qlik Sense Enterprise para Windows, para las versiones Mayo 2023 Parche 3 y anteriores, Febrero 2023 Parche 7 y anteriores, Noviembre 2022 Parche 10 y anteriores, y Agosto 2022 Parche 12 y anteriores, permite a un atacante remoto no autenticado generar una sesi\u00f3n an\u00f3nima. Esto le permite transmitir peticiones HTTP a endpoints no autorizados. Esto se ha corregido en la IR de Agosto de 2023, el Parche 4 de Mayo de 2023, el Parche 8 de febrero de 2023, el Parche 11 de Noviembre de 2022 y el Parche 13 de Agosto de 2022.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":4.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":2.5}]},\"cisaExploitAdd\":\"2023-12-07\",\"cisaActionDue\":\"2023-12-28\",\"cisaRequiredAction\":\"Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\",\"cisaVulnerabilityName\":\"Qlik Sense Path Traversal Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:august_2022:-:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"41AEA1CA-D344-48DB-92D8-05D0EDC8487D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_1:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"FC12BB7A-366F-4EE2-AABF-19E83B5B9EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_10:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"5F601CFC-70D0-450B-AE49-058E6B887E15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_11:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"17E7F947-3322-46BB-9B89-689F1B792D89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_12:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"37AF6E89-73F0-49E8-82F4-08084A5EBE2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_2:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"E4C7CBBB-C6A0-460E-95DC-C1855826C7F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_3:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"BD491E32-270C-452B-AC1E-FB8F509B916E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_4:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"EDE2809B-4234-443E-9E6A-6B402D258617\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_5:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"155F0D6F-2E4A-40E7-9145-7D130334466B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_6:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"D733F495-E0EF-4F25-8532-2773415EFB8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_7:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"578092D7-0F52-45C1-B7E2-FC5AF86AB8ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_8:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"1B3164BA-0BDB-41F9-B51C-4FB0489A125A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_9:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"E0D31C35-50DC-4CDF-AFD4-311EAF5BBBD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:february_2023:-:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"95BBBA68-269F-4385-9D14-A736F2CD707E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_1:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"E6E1046C-35F4-451A-BFF1-2FC6EB01B547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_2:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"D9AB037B-EE88-47CD-B387-42651CBAAFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_3:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"3D28B87A-B36A-428E-A93B-255CFD62036F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_4:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"9AD961D6-A315-493C-926F-1441E51C1742\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_5:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"1EFEBD77-7968-4649-8E9B-DAB24DC36E64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_6:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"E6D033E6-C022-4C6B-9EAC-95ABF6CA9BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_7:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"761B402F-4E98-46A4-A8E3-87F167CF01D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:may_2023:-:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"9E7034FB-5E64-47AD-B4A4-8428474C48C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:may_2023:patch_1:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"29158A06-3DE9-487B-9BC5-B4A690864F4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:may_2023:patch_2:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"272C2CFE-0D8E-46CE-92B6-2BA8658C951B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:may_2023:patch3:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"039E4C03-89CA-4E77-8D79-39D22E85A299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:november_2022:-:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"72D56C24-9CEF-486B-8E46-6111D7B1676A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_1:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"338E52B2-AD7D-43F3-B707-E0E5976B269E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_10:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"D216C67A-F124-49F0-90EA-B0C8B663D760\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_2:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"FA68ADC7-9E20-4BD3-9235-6D76D4519512\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_3:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"B41A9B8C-FAD3-46F1-8973-DF1FA408064B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_4:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"EE23F5BD-579C-488D-965A-AE916C32976A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_5:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"E9C90120-93D1-43B0-B541-F07EB8FD44EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_6:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"450F236B-4673-403C-9E23-736C0ED92F6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_7:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"D5E431DE-26E2-4DA2-AD0B-1479D0C95B98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_8:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"0D6F6570-970B-4E49-9D92-65FAFCC71360\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_9:*:*:enterprise:windows:*:*\",\"matchCriteriaId\":\"38116465-3485-44D3-9097-F2C821D8278F\"}]}]}],\"references\":[{\"url\":\"https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://community.qlik.com/t5/Release-Notes/tkb-p/ReleaseNotes\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://community.qlik.com/t5/Release-Notes/tkb-p/ReleaseNotes\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41266\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://community.qlik.com/t5/Release-Notes/tkb-p/ReleaseNotes\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T18:54:04.991Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-41266\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-04-23T04:01:03.822744Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2023-12-07\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41266\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:qlik:qlik_sense:august_2022:patch_12:*:*:enterprise:windows:*:*\"], \"vendor\": \"qlik\", \"product\": \"qlik_sense\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"august_2022\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:qlik:qlik_sense:may_2023:patch3:*:*:enterprise:windows:*:*\"], \"vendor\": \"qlik\", \"product\": \"qlik_sense\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"may_2023\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:qlik:qlik_sense:february_2023:patch_7:*:*:enterprise:windows:*:*\"], \"vendor\": \"qlik\", \"product\": \"qlik_sense\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"february_2023\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:qlik:qlik_sense:november_2022:patch_10:*:*:enterprise:windows:*:*\"], \"vendor\": \"qlik\", \"product\": \"qlik_sense\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"november_2022\"}], \"defaultStatus\": \"unknown\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-41266\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-22\", \"description\": \"CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-04-25T19:03:10.297Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AC:L/AV:N/A:N/C:H/I:L/PR:N/S:U/UI:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://community.qlik.com/t5/Release-Notes/tkb-p/ReleaseNotes\"}, {\"url\": \"https://community.qlik.com/t5/Official-Support-Articles/Critical-Security-fixes-for-Qlik-Sense-Enterprise-for-Windows/ta-p/2110801\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A path traversal vulnerability found in Qlik Sense Enterprise for Windows for versions May 2023 Patch 3 and earlier, February 2023 Patch 7 and earlier, November 2022 Patch 10 and earlier, and August 2022 Patch 12 and earlier allows an unauthenticated remote attacker to generate an anonymous session. This allows them to transmit HTTP requests to unauthorized endpoints. This is fixed in August 2023 IR, May 2023 Patch 4, February 2023 Patch 8, November 2022 Patch 11, and August 2022 Patch 13.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-08-29T22:34:56.594Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-41266\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-30T15:32:22.573Z\", \"dateReserved\": \"2023-08-25T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-08-29T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…