First published: Tue Jun 06 2023(Updated: )
A security defect in Foundry's Comments functionality resulted in the retrieval of attachments to comments not being gated by additional authorization checks. This could enable an authenticated user to inject a prior discovered attachment UUID into other arbitrary comments to discover it's content. This defect was fixed in Foundry Comments 2.249.0, and a patch was rolled out to affected Foundry environments. No further intervention is required at this time.
Credit: cve-coordination@palantir.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palantir Foundry | <2.249.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30948 is a security defect in Foundry's Comments functionality that allows an authenticated user to discover the content of arbitrary comments by injecting a prior discovered attachment UUID.
CVE-2023-30948 has a severity rating of 6.5, which is considered medium.
The Palantir Foundry Comments software up to version 2.249.0 is affected by CVE-2023-30948.
An authenticated user can exploit CVE-2023-30948 by injecting a prior discovered attachment UUID into other arbitrary comments to discover their content.
Yes, you can find the reference for CVE-2023-30948 at the following link: https://palantir.safebase.us/?tcuUid=101b083b-6389-4261-98f8-23448e133a62