{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-30960","assignerOrgId":"bbcbe11d-db20-4bc2-8a6e-c79f87041fd4","state":"PUBLISHED","assignerShortName":"Palantir","dateReserved":"2023-04-21T11:25:51.028Z","datePublished":"2023-07-10T21:05:23.372Z","dateUpdated":"2024-10-23T17:43:12.391Z"},"containers":{"cna":{"providerMetadata":{"orgId":"bbcbe11d-db20-4bc2-8a6e-c79f87041fd4","shortName":"Palantir","dateUpdated":"2023-07-10T21:05:23.372Z"},"title":"Insecure Direct Object Reference (IDOR) in Foundry job-tracker","affected":[{"vendor":"Palantir","product":"com.palantir.foundry.jobtracker:job-tracker","versions":[{"version":"*","versionType":"semver","lessThan":"4.645.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A security defect was discovered in Foundry job-tracker that enabled users to query metadata related to builds on resources they did not have access to. This defect was resolved with the release of job-tracker 4.645.0. The service was rolled out to all affected Foundry instances. No further intervention is required.\n\n\n\n"}],"impacts":[{"capecId":"CAPEC-113","descriptions":[{"lang":"en","value":"An adversary manipulates the use or processing of an interface (e.g. Application Programming Interface (API) or System-on-Chip (SoC)) resulting in an adverse impact upon the security of the system implementing the interface. This can allow the adversary to bypass access control and/or execute functionality not intended by the interface implementation, possibly compromising the system which integrates the interface. Interface manipulation can take on a number of forms including forcing the unexpected use of an interface or the use of an interface in an unintended way."}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-639","description":"The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.","lang":"en","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM","baseScore":4.3},"format":"CVSS"}],"references":[{"url":"https://palantir.safebase.us/?tcuUid=115d9bf4-201f-4cfe-b2fc-219e3a2d945b"}],"source":{"discovery":"EXTERNAL","defect":["PLTRSEC-2023-26"]}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T14:45:24.245Z"},"title":"CVE Program Container","references":[{"url":"https://palantir.safebase.us/?tcuUid=115d9bf4-201f-4cfe-b2fc-219e3a2d945b","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-23T17:43:00.991393Z","id":"CVE-2023-30960","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-23T17:43:12.391Z"}}]}}