CVE-2022-27891

Palantir Gotham included an unauthenticated endpoint that listed all active usernames on the stack with an active session. The affected services have been patched and automatically deployed to all Apollo-managed Gotham instances. It is highly recommended that customers upgrade all affected services to the latest version. This issue affects: Palantir Gotham versions prior to 103.30221005.0.
Configurations

Configuration 1 (hide)

cpe:2.3:o:palantir:gotham:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:56

Type Values Removed Values Added
References () https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-10.md - Vendor Advisory () https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-10.md - Vendor Advisory

18 Jul 2023, 13:55

Type Values Removed Values Added
CWE CWE-200 CWE-306

Information

Published : 2023-02-16 16:15

Updated : 2024-11-21 06:56


NVD link : CVE-2022-27891

Mitre link : CVE-2022-27891

CVE.ORG link : CVE-2022-27891


JSON object : View

Products Affected

palantir

  • gotham
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-306

Missing Authentication for Critical Function