CVE-2023-22834 Vulnerability Details

  /     /     /  

CVE-2023-22834 Metadata Quick Info

CVE Published: 26/06/2023 | CVE Updated: 07/11/2024 | CVE Year: 2023
Source: Palantir | Vendor: Palantir | Product: com.palantir.contour:contour-dispatch
Status : PUBLISHED

CVE-2023-22834 Description

The Contour Service was not checking that users had permission to create an analysis for a given dataset. This could allow an attacker to clutter up Compass folders with extraneous analyses, that the attacker would otherwise not have permission to create.

Metrics

CVSS Version: 3.1 | Base Score: 2.7 LOW
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L/AR:L

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-425
CWE Name: The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.
Source: Palantir

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-115
CAPEC Description: An attacker gains access to application, service, or device with the privileges of an authorized or privileged user by evading or circumventing an authentication mechanism. The attacker is therefore able to access protected data without authentication ever having taken place.


Source: NVD (National Vulnerability Database).