cve/2023/CVE-2023-30959.md

18 lines
836 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-30959](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30959)
![](https://img.shields.io/static/v1?label=Product&message=com.palantir.apollo%3Aautopilot&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=*%3C%203.308.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=The%20web%20application%20improperly%20neutralizes%20user-controlled%20input%20for%20executable%20script%20disguised%20with%20URI%20encodings.&color=brighgreen)
### Description
In Apollo change requests, comments added by users could contain a javascript URI link that when rendered will result in an XSS that require user interaction.
### POC
#### Reference
- https://palantir.safebase.us/?tcuUid=4c257f07-58af-4532-892a-bdbe8ab3ec63
#### Github
No PoCs found on GitHub currently.