CVE-2023-48365: n/a
Qlik Sense Enterprise for Windows before August 2023 Patch 2 allows unauthenticated remote code execution, aka QB-21683. Due to improper validation of HTTP headers, a remote attacker is able to elevate their privilege by tunneling HTTP requests, allowing them to execute HTTP requests on the backend server that hosts the repository application. The fixed versions are August 2023 Patch 2, May 2023 Patch 6, February 2023 Patch 10, November 2022 Patch 12, August 2022 Patch 14, May 2022 Patch 16, February 2022 Patch 15, and November 2021 Patch 17. NOTE: this issue exists because of an incomplete fix for CVE-2023-41265.
AI Analysis
Technical Summary
CVE-2023-48365 is a critical vulnerability affecting Qlik Sense Enterprise for Windows versions prior to the August 2023 Patch 2 and several other earlier patches. The vulnerability arises from improper validation of HTTP headers, which allows an unauthenticated remote attacker to tunnel HTTP requests through the application. This tunneling enables the attacker to elevate privileges and execute arbitrary HTTP requests on the backend server hosting the repository application, effectively leading to remote code execution (RCE). The flaw is a consequence of an incomplete remediation of a prior vulnerability (CVE-2023-41265). The vulnerability is classified under CWE-444 (Improper Resource Shutdown or Release), indicating issues with how resources are handled during request processing. The CVSS v3.1 base score of 9.6 reflects the vulnerability's critical nature, with network attack vector, no user interaction, low attack complexity, and partial privileges required but resulting in complete system compromise (scope changed). The vulnerability impacts confidentiality, integrity, and availability severely. Multiple patch versions have been released to address this issue, including August 2023 Patch 2, May 2023 Patch 6, and several others dating back to November 2021 Patch 17. No public exploits have been reported yet, but the vulnerability's characteristics suggest it could be exploited easily by attackers scanning for vulnerable Qlik Sense Enterprise instances. The vulnerability's exploitation could allow attackers to execute arbitrary commands or code on the backend server, potentially leading to data theft, service disruption, or further network compromise.
Potential Impact
For European organizations, this vulnerability poses a significant threat, especially those relying on Qlik Sense Enterprise for critical business intelligence and data analytics. Successful exploitation could lead to unauthorized access to sensitive data, manipulation or destruction of data, and disruption of business operations. Given Qlik Sense's role in aggregating and analyzing enterprise data, attackers could leverage this vulnerability to pivot within networks, escalate privileges, and compromise additional systems. The lack of authentication requirement and ease of exploitation increase the risk of widespread attacks. Industries such as finance, healthcare, manufacturing, and government agencies in Europe that use Qlik Sense are particularly vulnerable, as data confidentiality and integrity are paramount. Additionally, disruption of analytics services could impact decision-making processes and operational continuity. The vulnerability could also be leveraged for espionage or sabotage in the context of geopolitical tensions, increasing the risk for countries with strategic economic or political importance.
Mitigation Recommendations
1. Immediate application of the latest patches released by Qlik for all affected versions, specifically August 2023 Patch 2 or later. 2. Restrict network access to the Qlik Sense repository server by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious HTTP header manipulations and tunneling attempts. 4. Monitor HTTP traffic logs for anomalies indicative of tunneling or unusual request patterns targeting the repository application. 5. Conduct regular vulnerability scans and penetration tests focused on Qlik Sense deployments to identify residual risks. 6. Implement strict access controls and least privilege principles for users and services interacting with Qlik Sense. 7. Maintain an incident response plan tailored to potential exploitation scenarios involving Qlik Sense. 8. Educate IT and security teams about this vulnerability and signs of exploitation to ensure rapid detection and response.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy, Spain, Belgium, Poland, Switzerland
CVE-2023-48365: n/a
Description
Qlik Sense Enterprise for Windows before August 2023 Patch 2 allows unauthenticated remote code execution, aka QB-21683. Due to improper validation of HTTP headers, a remote attacker is able to elevate their privilege by tunneling HTTP requests, allowing them to execute HTTP requests on the backend server that hosts the repository application. The fixed versions are August 2023 Patch 2, May 2023 Patch 6, February 2023 Patch 10, November 2022 Patch 12, August 2022 Patch 14, May 2022 Patch 16, February 2022 Patch 15, and November 2021 Patch 17. NOTE: this issue exists because of an incomplete fix for CVE-2023-41265.
AI-Powered Analysis
Technical Analysis
CVE-2023-48365 is a critical vulnerability affecting Qlik Sense Enterprise for Windows versions prior to the August 2023 Patch 2 and several other earlier patches. The vulnerability arises from improper validation of HTTP headers, which allows an unauthenticated remote attacker to tunnel HTTP requests through the application. This tunneling enables the attacker to elevate privileges and execute arbitrary HTTP requests on the backend server hosting the repository application, effectively leading to remote code execution (RCE). The flaw is a consequence of an incomplete remediation of a prior vulnerability (CVE-2023-41265). The vulnerability is classified under CWE-444 (Improper Resource Shutdown or Release), indicating issues with how resources are handled during request processing. The CVSS v3.1 base score of 9.6 reflects the vulnerability's critical nature, with network attack vector, no user interaction, low attack complexity, and partial privileges required but resulting in complete system compromise (scope changed). The vulnerability impacts confidentiality, integrity, and availability severely. Multiple patch versions have been released to address this issue, including August 2023 Patch 2, May 2023 Patch 6, and several others dating back to November 2021 Patch 17. No public exploits have been reported yet, but the vulnerability's characteristics suggest it could be exploited easily by attackers scanning for vulnerable Qlik Sense Enterprise instances. The vulnerability's exploitation could allow attackers to execute arbitrary commands or code on the backend server, potentially leading to data theft, service disruption, or further network compromise.
Potential Impact
For European organizations, this vulnerability poses a significant threat, especially those relying on Qlik Sense Enterprise for critical business intelligence and data analytics. Successful exploitation could lead to unauthorized access to sensitive data, manipulation or destruction of data, and disruption of business operations. Given Qlik Sense's role in aggregating and analyzing enterprise data, attackers could leverage this vulnerability to pivot within networks, escalate privileges, and compromise additional systems. The lack of authentication requirement and ease of exploitation increase the risk of widespread attacks. Industries such as finance, healthcare, manufacturing, and government agencies in Europe that use Qlik Sense are particularly vulnerable, as data confidentiality and integrity are paramount. Additionally, disruption of analytics services could impact decision-making processes and operational continuity. The vulnerability could also be leveraged for espionage or sabotage in the context of geopolitical tensions, increasing the risk for countries with strategic economic or political importance.
Mitigation Recommendations
1. Immediate application of the latest patches released by Qlik for all affected versions, specifically August 2023 Patch 2 or later. 2. Restrict network access to the Qlik Sense repository server by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious HTTP header manipulations and tunneling attempts. 4. Monitor HTTP traffic logs for anomalies indicative of tunneling or unusual request patterns targeting the repository application. 5. Conduct regular vulnerability scans and penetration tests focused on Qlik Sense deployments to identify residual risks. 6. Implement strict access controls and least privilege principles for users and services interacting with Qlik Sense. 7. Maintain an incident response plan tailored to potential exploitation scenarios involving Qlik Sense. 8. Educate IT and security teams about this vulnerability and signs of exploitation to ensure rapid detection and response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-11-15T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7d9ae247d717aace26791
Added to database: 10/21/2025, 7:06:22 PM
Last enriched: 10/21/2025, 8:04:26 PM
Last updated: 10/30/2025, 3:12:50 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownCVE-2025-12466: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Drupal Simple OAuth (OAuth2) & OpenID Connect
UnknownCVE-2025-12083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal CivicTheme Design System
UnknownCVE-2025-12082: CWE-863 Incorrect Authorization in Drupal CivicTheme Design System
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.