CVE-2023-30969
📋 TL;DR
CVE-2023-30969 is an authentication/authorization bypass vulnerability in Palantir Tiles1 service where API endpoints lack proper access controls. This allows unauthenticated attackers to access sensitive functionality and data. Organizations using Palantir Tiles1 service are affected.
💻 Affected Systems
- Palantir Tiles1 service
📦 What is this software?
Tiles by Palantir
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the Tiles1 service allowing unauthorized access to all data and functionality, potentially leading to data exfiltration, service disruption, or privilege escalation.
Likely Case
Unauthorized access to sensitive data and functionality through API endpoints, potentially exposing confidential information or allowing unauthorized operations.
If Mitigated
Limited impact if proper network segmentation and additional authentication layers are in place, though the core vulnerability remains.
🎯 Exploit Status
The vulnerability is straightforward to exploit by accessing unprotected API endpoints directly.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Specific version not publicly disclosed; consult Palantir support
Vendor Advisory: https://palantir.safebase.us/?tcuUid=afcbc9b2-de62-44b9-b28b-2ebf0684fbf7
Restart Required: Yes
Instructions:
1. Contact Palantir support for specific patch version. 2. Apply the security update to all Tiles1 instances. 3. Restart the Tiles1 service. 4. Verify authentication is enforced on all endpoints.
🔧 Temporary Workarounds
Network Access Control
allRestrict network access to Tiles1 service endpoints using firewall rules
API Gateway Authentication
allPlace Tiles1 behind an API gateway that enforces authentication before requests reach the service
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Tiles1 service from untrusted networks
- Deploy a reverse proxy with authentication in front of Tiles1 to enforce access controls
🔍 How to Verify
Check if Vulnerable:
Test API endpoints without authentication; if endpoints respond with data or functionality, the system is vulnerable.
Check Version:
Consult Palantir documentation or contact support for version checking commands specific to Tiles1 deployment.
Verify Fix Applied:
After patching, test API endpoints without authentication; all should return authentication errors or be inaccessible.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated API requests to Tiles1 endpoints
- Access patterns showing requests without authentication headers
Network Indicators:
- Unusual API traffic patterns from unauthorized sources
- Direct API calls without authentication tokens
SIEM Query:
source="tiles1" AND (NOT auth_token_present OR auth_failure=false) AND http_status=200