CVE-2023-22835

7.7 HIGH

📋 TL;DR

This vulnerability allows authenticated users of Foundry Issues to submit malformed data that causes a denial of service, disrupting frontend functionality for all participants in affected issues. It affects organizations using vulnerable versions of Foundry Issues and Foundry Frontend. The attack requires user access to the Issues component.

💻 Affected Systems

Products:
  • Foundry Issues
  • Foundry Frontend
Versions: Foundry Issues versions before 2.510.0 and Foundry Frontend versions before 6.228.0
Operating Systems: All supported OS for Foundry platform
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Foundry Issues component to be enabled and accessible to users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of frontend functionality for all participants in affected issues, potentially impacting business operations that rely on issue tracking and collaboration.

🟠

Likely Case

Temporary loss of frontend functionality for issue participants, requiring issue recreation or system restart to restore service.

🟢

If Mitigated

Minimal impact with proper input validation and monitoring in place, though some service disruption may still occur.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to Foundry Issues. The vulnerability involves submitting malformed data through normal issue creation/editing interfaces.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Foundry Issues 2.510.0 and Foundry Frontend 6.228.0

Vendor Advisory: https://palantir.safebase.us/?tcuUid=0e2e79bd-cc03-42a8-92c2-c0e68a1ea53d

Restart Required: Yes

Instructions:

1. Update Foundry Issues to version 2.510.0 or later. 2. Update Foundry Frontend to version 6.228.0 or later. 3. Restart all Foundry services. 4. Verify the updates are applied correctly.

🔧 Temporary Workarounds

Restrict Issue Creation Permissions

all

Temporarily limit which users can create or edit issues to reduce attack surface.

Enhanced Input Validation

all

Implement additional input validation at network perimeter or application layer.

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can create or modify issues
  • Monitor issue creation logs for unusual patterns or malformed data submissions

🔍 How to Verify

Check if Vulnerable:

Check Foundry Issues version (must be <2.510.0) and Foundry Frontend version (must be <6.228.0)

Check Version:

Check Foundry admin console or configuration files for version information

Verify Fix Applied:

Confirm Foundry Issues version is ≥2.510.0 and Foundry Frontend version is ≥6.228.0, then test issue creation with various inputs

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns in issue creation logs
  • Multiple failed issue submissions with malformed data
  • Error logs indicating frontend functionality disruption

Network Indicators:

  • Increased HTTP error responses from Foundry Issues endpoints
  • Unusual traffic patterns to issue creation APIs

SIEM Query:

source="foundry-issues" AND (event="issue_creation" OR event="issue_update") AND (data_contains="malformed" OR status="error")

🔗 References

📤 Share & Export