It was discovered that the Magritte-ftp was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service. In the case of a successful man in the middle attack on magritte-ftp, an attacker would be able to read and modify network traffic such as authentication tokens or raw data entering a Palantir Foundry stack.
References
Link | Resource |
---|---|
https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-13.md | Vendor Advisory |
https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-13.md | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-13.md - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
Information
Published : 2023-02-16 16:15
Updated : 2024-11-21 07:33
NVD link : CVE-2022-48307
Mitre link : CVE-2022-48307
CVE.ORG link : CVE-2022-48307
JSON object : View
Products Affected
palantir
- magritte-ftp