CVE-2025-62487 (CNNVD-202601-1586)

LOW
中文标题:
Palantir Gotham和Palantir Dossier 安全漏洞
英文标题:
Under certain configurations, file artifacts uploaded to the Dossier and Slides apps did not inherit security markings of their parent artifact. This lack of security markings could lead to unintended access to the uploaded files.
CVSS分数: 3.5
发布时间: 2026-01-09 21:17:37
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v3
漏洞描述
中文描述:

Palantir Gotham和Palantir Dossier都是美国Palantir公司的产品。Palantir Gotham是一款可商用、支持人工智能的操作系统。Palantir Dossier是一个写作调查和动态报告工具。 Palantir Gotham和Palantir Dossier存在安全漏洞,该漏洞源于上传的图像未正确标记安全级别,可能导致文件仅添加Everyone组。

英文描述:

### Details On October 1, 2025, Palantir discovered that images uploaded through the Dossier front-end app were not being marked correctly with the proper security levels. The regression was traced back to a change in May 2025, which was meant to allow file uploads to be shared among different artifacts (e.g. other dossiers and presentations). On deployments configured with CBAC, the front-end would present a security picker dialog to set the security level on the uploads, thereby mitigating the issue. On deployments without a CBAC configuration, no security picker dialog appears, leading to a security level of CUSTOM with no markings or datasets selected. The resulting markings and groups for the file uploads thus will be only those added by the “Default authorization rules” defined in the Auth Chooser configuration. On most environments, it is expected that the “Default authorization rules" only add the Everyone group.

CWE类型:
CWE-863
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Palantir com.palantir.acme:gotham-default-apps-bundle - < 100.30251002.0 - cpe:2.3:a:palantir:com.palantir.acme:gotham-default-apps-bundle:*:*:*:*:*:*:*:*
Palantir com.palantir.acme:stencil-app-bundle - < 100.30251002.0 - cpe:2.3:a:palantir:com.palantir.acme:stencil-app-bundle:*:*:*:*:*:*:*:*
Palantir com.palantir.acme:dossier-app - < 100.30251002.0 - cpe:2.3:a:palantir:com.palantir.acme:dossier-app:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
CVSS评分详情
3.1 (cna)
LOW
3.5
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N/CR:H/IR:H/AR:H
机密性
LOW
完整性
NONE
可用性
NONE
时间信息
发布时间:
2026-01-09 21:17:37
修改时间:
2026-01-09 21:36:29
创建时间:
2026-01-12 02:12:13
更新时间:
2026-01-16 02:48:21
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-62487 2026-01-10 04:00:23 2026-01-12 02:12:13
NVD nvd_CVE-2025-62487 2026-01-10 04:01:03 2026-01-12 02:27:57
CNNVD cnnvd_CNNVD-202601-1586 2026-01-13 07:38:23 2026-01-13 07:41:08
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2026-01-13 07:41:08
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202601-1586; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202601-1586
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2026-01-12 02:27:57
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']