CVE-2023-30963 Vulnerability Details

  /     /     /  

CVE-2023-30963 Metadata Quick Info

CVE Published: 10/07/2023 | CVE Updated: 21/10/2024 | CVE Year: 2023
Source: Palantir | Vendor: Palantir | Product: com.palantir.foundry:foundry-frontend
Status : PUBLISHED

CVE-2023-30963 Description

A security defect was discovered in Foundry Frontend which enabled users to perform Stored XSS attacks in Slate if Foundry\'s CSP were to be bypassed. This defect was resolved with the release of Foundry Frontend 6.229.0. The service was rolled out to all affected Foundry instances. No further intervention is required.

Metrics

CVSS Version: 3.1 | Base Score: 5.4 MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID: CWE-82
CWE Name: The web application does not neutralize or incorrectly neutralizes scripting elements within attributes of HTML IMG tags, such as the src attribute.
Source: Palantir

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-592
CAPEC Description: An adversary utilizes a form of Cross-site Scripting (XSS) where a malicious script is persistently "stored" within the data storage of a vulnerable web application as valid input.


Source: NVD (National Vulnerability Database).