cve/2023/CVE-2023-22835.md

20 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-22835](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22835)
![](https://img.shields.io/static/v1?label=Product&message=com.palantir.foundry%3Afoundry-frontend&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=com.palantir.issues%3Aissues&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%202.510.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%206.228.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=The%20product%20receives%20input%20or%20data%2C%20but%20it%20does%0A%20%20%20%20%20%20%20%20not%20validate%20or%20incorrectly%20validates%20that%20the%20input%20has%20the%0A%20%20%20%20%20%20%20%20properties%20that%20are%20required%20to%20process%20the%20data%20safely%20and%0A%20%20%20%20%20%20%20%20correctly.&color=brighgreen)
### Description
A security defect was identified that enabled a user of Foundry Issues to perform a Denial of Service attack by submitting malformed data in an Issue that caused loss of frontend functionality to all issue participants.This defect was resolved with the release of Foundry Issues 2.510.0 and Foundry Frontend 6.228.0.
### POC
#### Reference
- https://palantir.safebase.us/?tcuUid=0e2e79bd-cc03-42a8-92c2-c0e68a1ea53d
#### Github
No PoCs found on GitHub currently.