Skip to main content

CVE-2023-43304: n/a in n/a

High
VulnerabilityCVE-2023-43304cvecve-2023-43304
Published: Thu Dec 07 2023 (12/07/2023, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An issue in PARK DANDAN mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.

AI-Powered Analysis

AILast updated: 07/07/2025, 08:25:40 UTC

Technical Analysis

CVE-2023-43304 is a high-severity vulnerability identified in the PARK DANDAN mini-app running on Line version 13.6.1. The vulnerability arises due to leakage of the channel access token, which is a sensitive credential used to authenticate and authorize interactions with the Line platform's messaging channels. An attacker who successfully obtains this token can exploit it to send crafted malicious notifications to users of the mini-app without requiring any privileges or user interaction. The CVSS 3.1 base score of 8.2 reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality is high because the attacker can impersonate legitimate notifications, potentially leading to phishing, social engineering, or spreading malware. The integrity impact is low since the attacker cannot directly modify data but can influence user behavior through deceptive messages. Availability is not affected. The vulnerability is categorized under CWE-290, which relates to authentication issues, indicating improper protection of authentication tokens. No patches or vendor information are currently available, and no known exploits have been reported in the wild as of the publication date (December 7, 2023). This vulnerability specifically targets the PARK DANDAN mini-app on Line, a popular messaging platform, which may have a user base in various regions including Europe.

Potential Impact

For European organizations, the primary risk lies in the potential for attackers to send malicious notifications that could lead to phishing attacks, credential theft, or distribution of malware through social engineering. Organizations using Line and its mini-app ecosystem for customer engagement, internal communications, or marketing could see compromised trust and reputational damage if their users receive fraudulent messages. The confidentiality breach of the channel access token could also allow attackers to impersonate legitimate communications, increasing the risk of targeted attacks. While the vulnerability does not directly impact system availability or data integrity, the indirect effects on user security and organizational reputation could be significant. Sectors with high reliance on Line for communication, such as retail, finance, or customer service, are particularly vulnerable. Additionally, the lack of patches or mitigations at the time of disclosure increases the urgency for organizations to implement compensating controls.

Mitigation Recommendations

Given the absence of official patches, European organizations should take immediate steps to mitigate the risk: 1) Restrict and monitor access to channel access tokens rigorously, ensuring they are stored securely and rotated frequently to limit exposure. 2) Implement anomaly detection on messaging patterns to identify and block suspicious notifications that do not conform to expected behavior. 3) Educate users about the risk of phishing and malicious notifications, emphasizing verification of message authenticity before taking action. 4) Collaborate with Line platform administrators to report the vulnerability and seek guidance or temporary protective measures. 5) Consider limiting the use of the PARK DANDAN mini-app or Line messaging channels for sensitive communications until the vulnerability is resolved. 6) Employ endpoint security solutions capable of detecting and blocking malicious payloads delivered via messaging platforms. 7) Conduct regular security audits of third-party mini-apps integrated into organizational communication channels to identify potential token leakage or authentication weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-09-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683732d3182aa0cae25301ee

Added to database: 5/28/2025, 3:59:15 PM

Last enriched: 7/7/2025, 8:25:40 AM

Last updated: 8/9/2025, 8:13:43 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats