A vulnerability in Qlik Sense Enterprise on Windows could allow an remote attacker to enumerate domain user accounts. An attacker could exploit this vulnerability by sending authentication requests to an affected system. A successful exploit could allow the attacker to compare the response time that are returned by the affected system to determine which accounts are valid user accounts. Affected systems are only vulnerable if they have LDAP configured.
The affected URI is /internal_forms_authentication/ the response time of the form is longer if the supplied user does not exists and shorter if the user exists.
References
Link | Resource |
---|---|
https://community.qlik.com/t5/Release-Notes/Qlik-Sense-Enterprise-on-Windows-November-2021-Initial-Release/ta-p/1856531 | Release Notes |
https://csirt.divd.nl/CVE-2022-0564/ | Third Party Advisory |
https://csirt.divd.nl/DIVD-2021-00021/ | Third Party Advisory |
https://community.qlik.com/t5/Release-Notes/Qlik-Sense-Enterprise-on-Windows-November-2021-Initial-Release/ta-p/1856531 | Release Notes |
https://csirt.divd.nl/CVE-2022-0564/ | Third Party Advisory |
https://csirt.divd.nl/DIVD-2021-00021/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
25 Apr 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A vulnerability in Qlik Sense Enterprise on Windows could allow an remote attacker to enumerate domain user accounts. An attacker could exploit this vulnerability by sending authentication requests to an affected system. A successful exploit could allow the attacker to compare the response time that are returned by the affected system to determine which accounts are valid user accounts. Affected systems are only vulnerable if they have LDAP configured. The affected URI is /internal_forms_authentication/ the response time of the form is longer if the supplied user does not exists and shorter if the user exists. |
21 Nov 2024, 06:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.qlik.com/t5/Release-Notes/Qlik-Sense-Enterprise-on-Windows-November-2021-Initial-Release/ta-p/1856531 - Release Notes | |
References | () https://csirt.divd.nl/CVE-2022-0564/ - Third Party Advisory | |
References | () https://csirt.divd.nl/DIVD-2021-00021/ - Third Party Advisory |
24 Feb 2023, 14:38
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
02 Mar 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability in Qlik Sense Enterprise on Windows could allow an remote attacker to enumerate domain user accounts. An attacker could exploit this vulnerability by sending authentication requests to an affected system. A successful exploit could allow the attacker to compare the response time that are returned by the affected system to determine which accounts are valid user accounts. Affected systems are only vulnerable if they have LDAP configured. |
01 Mar 2022, 16:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 5.3 |
CWE | CWE-203 | |
CPE | cpe:2.3:a:qlik:qlik_sense:*:*:*:*:enterprise:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://community.qlik.com/t5/Release-Notes/Qlik-Sense-Enterprise-on-Windows-November-2021-Initial-Release/ta-p/1856531 - Release Notes, Vendor Advisory | |
References | (CONFIRM) https://csirt.divd.nl/cves/CVE-2022-0564 - Third Party Advisory | |
References | (CONFIRM) https://csirt.divd.nl/cases/DIVD-2021-00021 - Third Party Advisory |
21 Feb 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-21 18:15
Updated : 2025-04-25 16:15
NVD link : CVE-2022-0564
Mitre link : CVE-2022-0564
CVE.ORG link : CVE-2022-0564
JSON object : View
Products Affected
microsoft
- windows
qlik
- qlik_sense