Skip to main content

CVE-2023-30970: The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory. in Palantir com.palantir.gotham:blackbird-witchcraft

Medium
VulnerabilityCVE-2023-30970cvecve-2023-30970
Published: Mon Jan 29 2024 (01/29/2024, 18:27:26 UTC)
Source: CVE Database V5
Vendor/Project: Palantir
Product: com.palantir.gotham:blackbird-witchcraft

Description

Gotham Table service and Forward App were found to be vulnerable to a Path traversal issue allowing an authenticated user to read arbitrary files on the file system.

AI-Powered Analysis

AILast updated: 07/08/2025, 01:10:21 UTC

Technical Analysis

CVE-2023-30970 is a path traversal vulnerability identified in Palantir's Gotham product, specifically in the com.palantir.gotham:blackbird-witchcraft component, which includes the Gotham Table service and Forward App. The vulnerability arises because the product improperly handles external input used to construct file pathnames. It fails to neutralize absolute path sequences such as "/abs/path", allowing an authenticated user to craft requests that access files outside the intended restricted directory. This flaw enables an attacker with valid credentials to read arbitrary files on the underlying file system, potentially exposing sensitive configuration files, credentials, or other critical data. The vulnerability has a CVSS 3.1 base score of 6.5, indicating medium severity. The attack vector is network-based with low attack complexity, requiring privileges (authenticated user) but no user interaction. The impact is high on confidentiality, as unauthorized file disclosure is possible, but it does not affect integrity or availability. No known exploits are reported in the wild as of the published date (January 29, 2024). The vulnerability affects all versions of the product, suggesting a systemic issue in input validation for path construction within these components.

Potential Impact

For European organizations using Palantir Gotham, particularly the Table service and Forward App, this vulnerability poses a significant risk to data confidentiality. Palantir Gotham is widely used in government, intelligence, defense, and critical infrastructure sectors across Europe for data integration and analysis. An attacker exploiting this vulnerability could access sensitive internal files, including configuration files, credentials, or proprietary data, potentially leading to data breaches or further lateral movement within the network. Given the strategic importance of Palantir's software in public sector and critical infrastructure environments, exploitation could undermine operational security and trust. Although exploitation requires authentication, insider threats or compromised credentials could facilitate attacks. The lack of impact on integrity and availability limits the scope to information disclosure, but the sensitivity of exposed data could have severe consequences for privacy, regulatory compliance (e.g., GDPR), and national security.

Mitigation Recommendations

1. Immediate patching: Organizations should monitor Palantir's official channels for patches or updates addressing CVE-2023-30970 and apply them promptly once available. 2. Access control hardening: Restrict access to Gotham services to trusted users only, enforce strong authentication mechanisms, and implement least privilege principles to minimize the risk of credential compromise. 3. Input validation enhancement: If custom configurations or extensions are used, ensure that any file path inputs are strictly validated and sanitized to prevent absolute path traversal sequences. 4. Monitoring and detection: Deploy file access monitoring and anomaly detection to identify unusual file read activities, especially attempts to access files outside expected directories. 5. Network segmentation: Isolate Gotham services within secure network segments to limit exposure and lateral movement in case of compromise. 6. Credential management: Regularly rotate credentials and implement multi-factor authentication to reduce the risk of unauthorized access. 7. Incident response readiness: Prepare for potential exploitation scenarios by having incident response plans that include forensic analysis of file access logs and rapid containment procedures.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Palantir
Date Reserved
2023-04-21T11:42:33.501Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683879c7182aa0cae2829649

Added to database: 5/29/2025, 3:14:15 PM

Last enriched: 7/8/2025, 1:10:21 AM

Last updated: 8/13/2025, 7:05:03 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats