CVE-2023-43304: n/a in n/a
An issue in PARK DANDAN mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
AI Analysis
Technical Summary
CVE-2023-43304 is a high-severity vulnerability identified in the PARK DANDAN mini-app running on Line version 13.6.1. The vulnerability arises due to leakage of the channel access token, which is a sensitive credential used to authenticate and authorize interactions with the Line platform's messaging channels. An attacker who successfully obtains this token can exploit it to send crafted malicious notifications to users of the mini-app without requiring any privileges or user interaction. The CVSS 3.1 base score of 8.2 reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality is high because the attacker can impersonate legitimate notifications, potentially leading to phishing, social engineering, or spreading malware. The integrity impact is low since the attacker cannot directly modify data but can influence user behavior through deceptive messages. Availability is not affected. The vulnerability is categorized under CWE-290, which relates to authentication issues, indicating improper protection of authentication tokens. No patches or vendor information are currently available, and no known exploits have been reported in the wild as of the publication date (December 7, 2023). This vulnerability specifically targets the PARK DANDAN mini-app on Line, a popular messaging platform, which may have a user base in various regions including Europe.
Potential Impact
For European organizations, the primary risk lies in the potential for attackers to send malicious notifications that could lead to phishing attacks, credential theft, or distribution of malware through social engineering. Organizations using Line and its mini-app ecosystem for customer engagement, internal communications, or marketing could see compromised trust and reputational damage if their users receive fraudulent messages. The confidentiality breach of the channel access token could also allow attackers to impersonate legitimate communications, increasing the risk of targeted attacks. While the vulnerability does not directly impact system availability or data integrity, the indirect effects on user security and organizational reputation could be significant. Sectors with high reliance on Line for communication, such as retail, finance, or customer service, are particularly vulnerable. Additionally, the lack of patches or mitigations at the time of disclosure increases the urgency for organizations to implement compensating controls.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate steps to mitigate the risk: 1) Restrict and monitor access to channel access tokens rigorously, ensuring they are stored securely and rotated frequently to limit exposure. 2) Implement anomaly detection on messaging patterns to identify and block suspicious notifications that do not conform to expected behavior. 3) Educate users about the risk of phishing and malicious notifications, emphasizing verification of message authenticity before taking action. 4) Collaborate with Line platform administrators to report the vulnerability and seek guidance or temporary protective measures. 5) Consider limiting the use of the PARK DANDAN mini-app or Line messaging channels for sensitive communications until the vulnerability is resolved. 6) Employ endpoint security solutions capable of detecting and blocking malicious payloads delivered via messaging platforms. 7) Conduct regular security audits of third-party mini-apps integrated into organizational communication channels to identify potential token leakage or authentication weaknesses.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2023-43304: n/a in n/a
Description
An issue in PARK DANDAN mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
AI-Powered Analysis
Technical Analysis
CVE-2023-43304 is a high-severity vulnerability identified in the PARK DANDAN mini-app running on Line version 13.6.1. The vulnerability arises due to leakage of the channel access token, which is a sensitive credential used to authenticate and authorize interactions with the Line platform's messaging channels. An attacker who successfully obtains this token can exploit it to send crafted malicious notifications to users of the mini-app without requiring any privileges or user interaction. The CVSS 3.1 base score of 8.2 reflects the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality is high because the attacker can impersonate legitimate notifications, potentially leading to phishing, social engineering, or spreading malware. The integrity impact is low since the attacker cannot directly modify data but can influence user behavior through deceptive messages. Availability is not affected. The vulnerability is categorized under CWE-290, which relates to authentication issues, indicating improper protection of authentication tokens. No patches or vendor information are currently available, and no known exploits have been reported in the wild as of the publication date (December 7, 2023). This vulnerability specifically targets the PARK DANDAN mini-app on Line, a popular messaging platform, which may have a user base in various regions including Europe.
Potential Impact
For European organizations, the primary risk lies in the potential for attackers to send malicious notifications that could lead to phishing attacks, credential theft, or distribution of malware through social engineering. Organizations using Line and its mini-app ecosystem for customer engagement, internal communications, or marketing could see compromised trust and reputational damage if their users receive fraudulent messages. The confidentiality breach of the channel access token could also allow attackers to impersonate legitimate communications, increasing the risk of targeted attacks. While the vulnerability does not directly impact system availability or data integrity, the indirect effects on user security and organizational reputation could be significant. Sectors with high reliance on Line for communication, such as retail, finance, or customer service, are particularly vulnerable. Additionally, the lack of patches or mitigations at the time of disclosure increases the urgency for organizations to implement compensating controls.
Mitigation Recommendations
Given the absence of official patches, European organizations should take immediate steps to mitigate the risk: 1) Restrict and monitor access to channel access tokens rigorously, ensuring they are stored securely and rotated frequently to limit exposure. 2) Implement anomaly detection on messaging patterns to identify and block suspicious notifications that do not conform to expected behavior. 3) Educate users about the risk of phishing and malicious notifications, emphasizing verification of message authenticity before taking action. 4) Collaborate with Line platform administrators to report the vulnerability and seek guidance or temporary protective measures. 5) Consider limiting the use of the PARK DANDAN mini-app or Line messaging channels for sensitive communications until the vulnerability is resolved. 6) Employ endpoint security solutions capable of detecting and blocking malicious payloads delivered via messaging platforms. 7) Conduct regular security audits of third-party mini-apps integrated into organizational communication channels to identify potential token leakage or authentication weaknesses.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-09-18T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683732d3182aa0cae25301ee
Added to database: 5/28/2025, 3:59:15 PM
Last enriched: 7/7/2025, 8:25:40 AM
Last updated: 8/9/2025, 8:13:43 PM
Views: 11
Related Threats
CVE-2025-8963: Deserialization in jeecgboot JimuReport
MediumCVE-2025-8715: Improper Neutralization of CRLF Sequences ('CRLF Injection') in PostgreSQL
HighCVE-2025-8714: Inclusion of Functionality from Untrusted Control Sphere in PostgreSQL
HighCVE-2025-8713: Exposure of Sensitive Information Through Metadata in PostgreSQL
LowCVE-2025-8961: Memory Corruption in LibTIFF
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.