8.2
CVE-2019-11628
- EPSS 0.34%
- Veröffentlicht 01.05.2019 03:29:00
- Zuletzt bearbeitet 21.11.2024 04:21:29
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
An issue was discovered in QlikView Server before 11.20 SR19, 12.00 and 12.10 before 12.10 SR11, 12.20 before SR9, and 12.30 before SR2; and Qlik Sense Enterprise and Qlik Analytics Platform installations that lack these patch levels: February 2018 Patch 4, April 2018 Patch 3, June 2018 Patch 3, September 2018 Patch 4, November 2018 Patch 4, or February 2019 Patch 2. An authenticated user may be able to bypass intended file-read restrictions via crafted Browser requests.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_1
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_10
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_11
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_12
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_13
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_14
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_15
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_16
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_17
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_2
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_3
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_4
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_5
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_6
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_7
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_8
Qlik ≫ Qlikview Server Version11.20 Updateservice_release_9
Qlik ≫ Qlikview Server Version12.00
Qlik ≫ Qlikview Server Version12.10 Updateservice_release_1
Qlik ≫ Qlikview Server Version12.10 Updateservice_release_2
Qlik ≫ Qlikview Server Version12.10 Updateservice_release_3
Qlik ≫ Qlikview Server Version12.10 Updateservice_release_4
Qlik ≫ Qlikview Server Version12.10 Updateservice_release_5
Qlik ≫ Qlikview Server Version12.10 Updateservice_release_6
Qlik ≫ Qlikview Server Version12.10 Updateservice_release_7
Qlik ≫ Qlikview Server Version12.10 Updateservice_release_8
Qlik ≫ Qlikview Server Version12.10 Updateservice_release_9
Qlik ≫ Qlikview Server Version12.20 Updateservice_release_1
Qlik ≫ Qlikview Server Version12.20 Updateservice_release_2
Qlik ≫ Qlikview Server Version12.20 Updateservice_release_3
Qlik ≫ Qlikview Server Version12.20 Updateservice_release_4
Qlik ≫ Qlikview Server Version12.30 Updateservice_release_1
Qlik ≫ Qlik Analytics Versionapril_2018
Qlik ≫ Qlik Analytics Versionfebruary_2018
Qlik ≫ Qlik Analytics Versionfebruary_2019
Qlik ≫ Qlik Analytics Versionjune_2017
Qlik ≫ Qlik Analytics Versionjune_2018
Qlik ≫ Qlik Analytics Versionnovember_2017
Qlik ≫ Qlik Analytics Versionnovember_2018
Qlik ≫ Qlik Analytics Versionseptember_2017
Qlik ≫ Qlik Analytics Versionseptember_2018
Qlik ≫ Qlik Sense Versionapril_2018 SwEditionenterprise
Qlik ≫ Qlik Sense Versionfebruary_2018 SwEditionenterprise
Qlik ≫ Qlik Sense Versionfebruary_2019 SwEditionenterprise
Qlik ≫ Qlik Sense Versionjune_2017 SwEditionenterprise
Qlik ≫ Qlik Sense Versionjune_2018 SwEditionenterprise
Qlik ≫ Qlik Sense Versionnovember_2017 SwEditionenterprise
Qlik ≫ Qlik Sense Versionnovember_2018 SwEditionenterprise
Qlik ≫ Qlik Sense Versionseptember_2017 SwEditionenterprise
Qlik ≫ Qlik Sense Versionseptember_2018 SwEditionenterprise
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.34% | 0.561 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
| nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
| cve@mitre.org | 8.2 | 1.8 | 5.8 |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
|
CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.