CVE-2023-30949 Vulnerability Details

  /     /     /  

CVE-2023-30949 Metadata Quick Info

CVE Published: 26/07/2023 | CVE Updated: 15/10/2024 | CVE Year: 2023
Source: Palantir | Vendor: Palantir | Product: com.palantir.slate:slate
Status : PUBLISHED

CVE-2023-30949 Description

A missing origin validation in Slate sandbox could be exploited by a malicious user to modify the page\'s content, which could lead to phishing attacks.

Metrics

CVSS Version: 3.1 | Base Score: 4.3 MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-1173
CWE Name: The product does not use, or incorrectly uses, an input validation framework that is provided by the source language or an independent library.
Source: Palantir

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-98
CAPEC Description: Phishing is a social engineering technique where an attacker masquerades as a legitimate entity with which the victim might do business in order to prompt the user to reveal some confidential information (very frequently authentication credentials) that can later be used by an attacker. Phishing is essentially a form of information gathering or "fishing" for information.


Source: NVD (National Vulnerability Database).