CVE-2023-30970: The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory. in Palantir com.palantir.gotham:blackbird-witchcraft
Gotham Table service and Forward App were found to be vulnerable to a Path traversal issue allowing an authenticated user to read arbitrary files on the file system.
AI Analysis
Technical Summary
CVE-2023-30970 is a path traversal vulnerability identified in Palantir's Gotham product, specifically in the com.palantir.gotham:blackbird-witchcraft component, which includes the Gotham Table service and Forward App. The vulnerability arises because the product improperly handles external input used to construct file pathnames. It fails to neutralize absolute path sequences such as "/abs/path", allowing an authenticated user to craft requests that access files outside the intended restricted directory. This flaw enables an attacker with valid credentials to read arbitrary files on the underlying file system, potentially exposing sensitive configuration files, credentials, or other critical data. The vulnerability has a CVSS 3.1 base score of 6.5, indicating medium severity. The attack vector is network-based with low attack complexity, requiring privileges (authenticated user) but no user interaction. The impact is high on confidentiality, as unauthorized file disclosure is possible, but it does not affect integrity or availability. No known exploits are reported in the wild as of the published date (January 29, 2024). The vulnerability affects all versions of the product, suggesting a systemic issue in input validation for path construction within these components.
Potential Impact
For European organizations using Palantir Gotham, particularly the Table service and Forward App, this vulnerability poses a significant risk to data confidentiality. Palantir Gotham is widely used in government, intelligence, defense, and critical infrastructure sectors across Europe for data integration and analysis. An attacker exploiting this vulnerability could access sensitive internal files, including configuration files, credentials, or proprietary data, potentially leading to data breaches or further lateral movement within the network. Given the strategic importance of Palantir's software in public sector and critical infrastructure environments, exploitation could undermine operational security and trust. Although exploitation requires authentication, insider threats or compromised credentials could facilitate attacks. The lack of impact on integrity and availability limits the scope to information disclosure, but the sensitivity of exposed data could have severe consequences for privacy, regulatory compliance (e.g., GDPR), and national security.
Mitigation Recommendations
1. Immediate patching: Organizations should monitor Palantir's official channels for patches or updates addressing CVE-2023-30970 and apply them promptly once available. 2. Access control hardening: Restrict access to Gotham services to trusted users only, enforce strong authentication mechanisms, and implement least privilege principles to minimize the risk of credential compromise. 3. Input validation enhancement: If custom configurations or extensions are used, ensure that any file path inputs are strictly validated and sanitized to prevent absolute path traversal sequences. 4. Monitoring and detection: Deploy file access monitoring and anomaly detection to identify unusual file read activities, especially attempts to access files outside expected directories. 5. Network segmentation: Isolate Gotham services within secure network segments to limit exposure and lateral movement in case of compromise. 6. Credential management: Regularly rotate credentials and implement multi-factor authentication to reduce the risk of unauthorized access. 7. Incident response readiness: Prepare for potential exploitation scenarios by having incident response plans that include forensic analysis of file access logs and rapid containment procedures.
Affected Countries
United Kingdom, France, Germany, Italy, Spain, Netherlands, Belgium, Sweden, Norway, Finland
CVE-2023-30970: The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize absolute path sequences such as "/abs/path" that can resolve to a location that is outside of that directory. in Palantir com.palantir.gotham:blackbird-witchcraft
Description
Gotham Table service and Forward App were found to be vulnerable to a Path traversal issue allowing an authenticated user to read arbitrary files on the file system.
AI-Powered Analysis
Technical Analysis
CVE-2023-30970 is a path traversal vulnerability identified in Palantir's Gotham product, specifically in the com.palantir.gotham:blackbird-witchcraft component, which includes the Gotham Table service and Forward App. The vulnerability arises because the product improperly handles external input used to construct file pathnames. It fails to neutralize absolute path sequences such as "/abs/path", allowing an authenticated user to craft requests that access files outside the intended restricted directory. This flaw enables an attacker with valid credentials to read arbitrary files on the underlying file system, potentially exposing sensitive configuration files, credentials, or other critical data. The vulnerability has a CVSS 3.1 base score of 6.5, indicating medium severity. The attack vector is network-based with low attack complexity, requiring privileges (authenticated user) but no user interaction. The impact is high on confidentiality, as unauthorized file disclosure is possible, but it does not affect integrity or availability. No known exploits are reported in the wild as of the published date (January 29, 2024). The vulnerability affects all versions of the product, suggesting a systemic issue in input validation for path construction within these components.
Potential Impact
For European organizations using Palantir Gotham, particularly the Table service and Forward App, this vulnerability poses a significant risk to data confidentiality. Palantir Gotham is widely used in government, intelligence, defense, and critical infrastructure sectors across Europe for data integration and analysis. An attacker exploiting this vulnerability could access sensitive internal files, including configuration files, credentials, or proprietary data, potentially leading to data breaches or further lateral movement within the network. Given the strategic importance of Palantir's software in public sector and critical infrastructure environments, exploitation could undermine operational security and trust. Although exploitation requires authentication, insider threats or compromised credentials could facilitate attacks. The lack of impact on integrity and availability limits the scope to information disclosure, but the sensitivity of exposed data could have severe consequences for privacy, regulatory compliance (e.g., GDPR), and national security.
Mitigation Recommendations
1. Immediate patching: Organizations should monitor Palantir's official channels for patches or updates addressing CVE-2023-30970 and apply them promptly once available. 2. Access control hardening: Restrict access to Gotham services to trusted users only, enforce strong authentication mechanisms, and implement least privilege principles to minimize the risk of credential compromise. 3. Input validation enhancement: If custom configurations or extensions are used, ensure that any file path inputs are strictly validated and sanitized to prevent absolute path traversal sequences. 4. Monitoring and detection: Deploy file access monitoring and anomaly detection to identify unusual file read activities, especially attempts to access files outside expected directories. 5. Network segmentation: Isolate Gotham services within secure network segments to limit exposure and lateral movement in case of compromise. 6. Credential management: Regularly rotate credentials and implement multi-factor authentication to reduce the risk of unauthorized access. 7. Incident response readiness: Prepare for potential exploitation scenarios by having incident response plans that include forensic analysis of file access logs and rapid containment procedures.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Palantir
- Date Reserved
- 2023-04-21T11:42:33.501Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683879c7182aa0cae2829649
Added to database: 5/29/2025, 3:14:15 PM
Last enriched: 7/8/2025, 1:10:21 AM
Last updated: 8/13/2025, 7:05:03 PM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.