Vulnerability Details : CVE-2019-11628
An issue was discovered in QlikView Server before 11.20 SR19, 12.00 and 12.10 before 12.10 SR11, 12.20 before SR9, and 12.30 before SR2; and Qlik Sense Enterprise and Qlik Analytics Platform installations that lack these patch levels: February 2018 Patch 4, April 2018 Patch 3, June 2018 Patch 3, September 2018 Patch 4, November 2018 Patch 4, or February 2019 Patch 2. An authenticated user may be able to bypass intended file-read restrictions via crafted Browser requests.
Products affected by CVE-2019-11628
- cpe:2.3:a:qlik:qlikview_server:12.30:service_release_1:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_3:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_8:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_10:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_17:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.10:service_release_3:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.20:service_release_1:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.20:service_release_3:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_4:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_5:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_6:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_7:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.10:service_release_5:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.10:service_release_6:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.10:service_release_7:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.10:service_release_8:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_12:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_13:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_14:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_15:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.20:service_release_4:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.10:service_release_1:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.00:*:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_1:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_2:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_9:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_11:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:11.20:service_release_16:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.10:service_release_2:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.10:service_release_4:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.10:service_release_9:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlikview_server:12.20:service_release_2:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlik_analytics:september_2017:*:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlik_analytics:february_2018:*:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlik_analytics:february_2019:*:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlik_analytics:september_2018:*:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlik_analytics:november_2018:*:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlik_analytics:april_2018:*:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlik_analytics:november_2017:*:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlik_analytics:june_2017:*:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlik_analytics:june_2018:*:*:*:*:*:*:*
- cpe:2.3:a:qlik:qlik_sense:september_2017:*:*:*:enterprise:*:*:*
- cpe:2.3:a:qlik:qlik_sense:february_2018:*:*:*:enterprise:*:*:*
- cpe:2.3:a:qlik:qlik_sense:february_2019:*:*:*:enterprise:*:*:*
- cpe:2.3:a:qlik:qlik_sense:september_2018:*:*:*:enterprise:*:*:*
- cpe:2.3:a:qlik:qlik_sense:november_2018:*:*:*:enterprise:*:*:*
- cpe:2.3:a:qlik:qlik_sense:april_2018:*:*:*:enterprise:*:*:*
- cpe:2.3:a:qlik:qlik_sense:june_2018:*:*:*:enterprise:*:*:*
- cpe:2.3:a:qlik:qlik_sense:november_2017:*:*:*:enterprise:*:*:*
- cpe:2.3:a:qlik:qlik_sense:june_2017:*:*:*:enterprise:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-11628
0.09%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 38 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-11628
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:N/A:N |
8.0
|
2.9
|
NIST | |
8.2
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N |
1.8
|
5.8
|
MITRE | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2019-11628
-
The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-11628
-
https://qliksupport.force.com/articles/000069985
SB: Improper Access Control Issue in QlikView Server and Qlik Sense EnterpriseVendor Advisory
Jump to