Lucene search

K
cvelistPalantirCVELIST:CVE-2023-22836
HistoryJan 29, 2024 - 6:50 p.m.

CVE-2023-22836 In cases where a multi-tenant stack user is operating Foundry’s Linter service, and the user changes the linter name from the default value, the renamed value may be visible to the rest of the stack’s tenants.

2024-01-2918:50:37
CWE-862
Palantir
www.cve.org
cve-2023-22836
multi-tenant
foundry
linter
security

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/CR:H/IR:H/AR:H

5.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.0%

In cases where a multi-tenant stack user is operating Foundry’s Linter service, and the user changes a group name from the default value, the renamed value may be visible to the rest of the stack’s tenants.

CNA Affected

[
  {
    "vendor": "Palantir",
    "product": "com.palantir.skywise:guardian",
    "versions": [
      {
        "version": "*",
        "versionType": "semver",
        "lessThan": "2.278.0",
        "status": "affected"
      }
    ]
  }
]

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/CR:H/IR:H/AR:H

5.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.0%

Related for CVELIST:CVE-2023-22836