First published: Wed Jul 26 2023(Updated: )
A missing origin validation in Slate sandbox could be exploited by a malicious user to modify the page's content, which could lead to phishing attacks.
Credit: cve-coordination@palantir.com cve-coordination@palantir.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palantir Slate | <6.207.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-30949.
The severity of CVE-2023-30949 is medium with a CVSS score of 5.3.
The affected software for CVE-2023-30949 is Palantir Slate with versions up to and excluding 6.207.0.
A malicious user can exploit CVE-2023-30949 by taking advantage of a missing origin validation in Slate sandbox to modify the page's content, potentially leading to phishing attacks.
Yes, it is recommended to update to a version of Palantir Slate that is newer than 6.207.0 to mitigate the vulnerability.