Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_1:*:*:*:*:*:*", "matchCriteriaId": "70348E24-DF95-4A83-820D-5F3C13055AE5", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_10:*:*:*:*:*:*", "matchCriteriaId": "1FBE0588-1011-4616-AF13-5312CDC262F5", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_11:*:*:*:*:*:*", "matchCriteriaId": "5C258DFA-C6E6-49F1-BE0F-4F1E78EF16B4", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_12:*:*:*:*:*:*", "matchCriteriaId": "9D625AA7-2063-45F1-873F-9FE8BD1AD127", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_13:*:*:*:*:*:*", "matchCriteriaId": "ED61447C-30A7-4369-AAB9-AC48B7ECE44C", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_14:*:*:*:*:*:*", "matchCriteriaId": "DE8DEAE0-083D-472C-8C89-F6452CA07FA1", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_15:*:*:*:*:*:*", "matchCriteriaId": "CA3B6615-A5F6-4DC6-B43B-E3C7D1453D86", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_16:*:*:*:*:*:*", "matchCriteriaId": "44A0F9B9-4169-45AB-A08D-0CD17AE9042E", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_17:*:*:*:*:*:*", "matchCriteriaId": "18CD5DDE-EE11-4D84-9830-22190C9D0BAC", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_2:*:*:*:*:*:*", "matchCriteriaId": "1E959F54-6B26-47D8-849E-B2D4309CE9FC", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_3:*:*:*:*:*:*", "matchCriteriaId": "804B8141-890B-49D3-AAF7-29B82DE458F4", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_4:*:*:*:*:*:*", "matchCriteriaId": "09765ABB-8EF3-48B8-A2CB-409574CDD491", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_5:*:*:*:*:*:*", "matchCriteriaId": "CDEA544E-D63B-4797-8BDA-20B7B7BA6FC3", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_6:*:*:*:*:*:*", "matchCriteriaId": "843EA971-B23E-4FD9-892D-AB5857C1AE47", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_7:*:*:*:*:*:*", "matchCriteriaId": "A11AC3DC-D026-4E43-9ADE-4E3BF0CC22EE", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_8:*:*:*:*:*:*", "matchCriteriaId": "44E5CA6C-9991-485F-98A7-7873684175D9", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:11.20:service_release_9:*:*:*:*:*:*", "matchCriteriaId": "D72BC295-687D-49AE-AB08-7A54F81066FA", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.00:*:*:*:*:*:*:*", "matchCriteriaId": "1EC12134-E1F6-411B-962C-EC0F733FE9A1", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.10:service_release_1:*:*:*:*:*:*", "matchCriteriaId": "DE1C9243-C526-4495-85EE-9DFF39E3747E", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.10:service_release_2:*:*:*:*:*:*", "matchCriteriaId": "76806FB7-5A08-4208-990F-5A255F74C3E9", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.10:service_release_3:*:*:*:*:*:*", "matchCriteriaId": "2C8950D8-E839-4A57-BA91-86CAA412FE79", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.10:service_release_4:*:*:*:*:*:*", "matchCriteriaId": "7F9C80CC-F74C-4FB8-946E-CB56C9EF1521", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.10:service_release_5:*:*:*:*:*:*", "matchCriteriaId": "E2D58713-EDA5-49C5-92FB-F34292DED794", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.10:service_release_6:*:*:*:*:*:*", "matchCriteriaId": "9DC4C1E3-401B-48DC-9E34-FB0805ADB1CC", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.10:service_release_7:*:*:*:*:*:*", "matchCriteriaId": "F51220EF-9CCB-4A52-8F8D-11A1141F2C21", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.10:service_release_8:*:*:*:*:*:*", "matchCriteriaId": "89E647FE-5A80-4455-AABA-F07B08A38641", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.10:service_release_9:*:*:*:*:*:*", "matchCriteriaId": "CAF8B5BB-EA7C-4973-8095-5E8BDA6076D1", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.20:service_release_1:*:*:*:*:*:*", "matchCriteriaId": "93B22D9A-4F9C-43A5-9C06-8102507FD4EB", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.20:service_release_2:*:*:*:*:*:*", "matchCriteriaId": "580CD55F-DE41-41B4-AA0E-996E670C408F", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.20:service_release_3:*:*:*:*:*:*", "matchCriteriaId": "1532D2D2-F60B-4E75-89EF-706013FB3DBD", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.20:service_release_4:*:*:*:*:*:*", "matchCriteriaId": "FE2C1342-1417-47FB-A4FB-FFAF66AC778F", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlikview_server:12.30:service_release_1:*:*:*:*:*:*", "matchCriteriaId": "873637C6-ADFE-4A15-9D33-F8D1092755B0", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:qlik:qlik_analytics:april_2018:*:*:*:*:*:*:*", "matchCriteriaId": "0B18B725-BDC3-4D09-A394-357294899ADF", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_analytics:february_2018:*:*:*:*:*:*:*", "matchCriteriaId": "58B51434-6094-41A3-8A2A-8E6BEBCAFF8D", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_analytics:february_2019:*:*:*:*:*:*:*", "matchCriteriaId": "52B01CFC-4052-47B3-AE3F-C35C6CB2420A", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_analytics:june_2017:*:*:*:*:*:*:*", "matchCriteriaId": "5A717032-F242-4FBC-B161-0468D93C62C4", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_analytics:june_2018:*:*:*:*:*:*:*", "matchCriteriaId": "0090402D-58DF-4789-B58A-578B9F12AEAC", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_analytics:november_2017:*:*:*:*:*:*:*", "matchCriteriaId": "2BAE1CAC-960E-4D47-B51E-B059DDB0359D", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_analytics:november_2018:*:*:*:*:*:*:*", "matchCriteriaId": "4304015D-9F88-42BC-A47E-AE97B4E376EB", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_analytics:september_2017:*:*:*:*:*:*:*", "matchCriteriaId": "04DAA0C1-C364-4569-8FA4-610CD1E36CED", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_analytics:september_2018:*:*:*:*:*:*:*", "matchCriteriaId": "FE495C90-D556-466D-AABF-5C63641A7B43", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_sense:april_2018:*:*:*:enterprise:*:*:*", "matchCriteriaId": "F70CE603-B271-4388-9807-C443356277B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_sense:february_2018:*:*:*:enterprise:*:*:*", "matchCriteriaId": "2CA0BCEC-51E6-485B-8149-2703E24249A9", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_sense:february_2019:*:*:*:enterprise:*:*:*", "matchCriteriaId": "A1C4A9DD-6B2D-400E-88B0-5D923CAC2118", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_sense:june_2017:*:*:*:enterprise:*:*:*", "matchCriteriaId": "F12B37BF-9FC8-4FED-90A8-73553E7E517B", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_sense:june_2018:*:*:*:enterprise:*:*:*", "matchCriteriaId": "6DB72ED4-AD95-4A05-99B7-BA1C13565CA3", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_sense:november_2017:*:*:*:enterprise:*:*:*", "matchCriteriaId": "AD584882-AF47-4219-BA91-0A6BD2120F3E", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_sense:november_2018:*:*:*:enterprise:*:*:*", "matchCriteriaId": "72BD1752-05AE-42CF-BA4E-1036A269C96D", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_sense:september_2017:*:*:*:enterprise:*:*:*", "matchCriteriaId": "CA72F3BE-791D-4D7B-925C-2B1E93319EA9", "vulnerable": true}, {"criteria": "cpe:2.3:a:qlik:qlik_sense:september_2018:*:*:*:enterprise:*:*:*", "matchCriteriaId": "2B0543DF-9C64-4545-996E-6B5B572A52AA", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "An issue was discovered in QlikView Server before 11.20 SR19, 12.00 and 12.10 before 12.10 SR11, 12.20 before SR9, and 12.30 before SR2; and Qlik Sense Enterprise and Qlik Analytics Platform installations that lack these patch levels: February 2018 Patch 4, April 2018 Patch 3, June 2018 Patch 3, September 2018 Patch 4, November 2018 Patch 4, or February 2019 Patch 2. An authenticated user may be able to bypass intended file-read restrictions via crafted Browser requests."}, {"lang": "es", "value": "Fue encontrado un problema en QlikView Server versi\u00f3n anterior a 11.20 SR19, versi\u00f3n 12.00 y versi\u00f3n 12.10 anterior a 12.10 SR11, versi\u00f3n 12.20 anterior a SR9 y versi\u00f3n 12.30 anterior a SR2; y Qlik Sense Enterprise y Qlik Analytics Platform, ya que se presentan instalaciones q carecen de estos niveles de path: febrero de 2018 path 4, abril de 2018 path 3, junio de 2018 path 3, septiembre de 2018 path 4, noviembre de 2018 path 4 o febrero de 2019 path 2. Un usuario identificado puede ser capaz de omitir las restricciones de lectura de archivos previstas por medio de petici\u00f3nes de navegador creadas."}], "id": "CVE-2019-11628", "lastModified": "2024-11-21T04:21:29.393", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.0"}, "exploitabilityScore": 1.8, "impactScore": 5.8, "source": "cve@mitre.org", "type": "Secondary"}, {"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2019-05-01T03:29:00.230", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://qliksupport.force.com/articles/000069985"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://qliksupport.force.com/articles/000069985"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-917"}], "source": "nvd@nist.gov", "type": "Primary"}]}