First published: Tue Sep 26 2023(Updated: )
In Apollo change requests, comments added by users could contain a javascript URI link that when rendered will result in an XSS that require user interaction.
Credit: cve-coordination@palantir.com cve-coordination@palantir.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palantir Apollo Autopilot | <3.308.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30959 is a vulnerability in Apollo change requests that allows users to add comments with a JavaScript URI link, resulting in an XSS attack.
CVE-2023-30959 has a severity rating of 5.4, which is considered medium.
The Palantir Apollo Autopilot software version up to 3.308.0 is affected by CVE-2023-30959.
To fix CVE-2023-30959, it is recommended to update Palantir Apollo Autopilot to a version that includes a patch for the vulnerability.
The Common Weakness Enumeration (CWE) for CVE-2023-30959 is CWE-79, which refers to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').