Palantir Gotham included an unauthenticated endpoint that listed all active usernames on the stack with an active session. The affected services have been patched and automatically deployed to all Apollo-managed Gotham instances. It is highly recommended that customers upgrade all affected services to the latest version. This issue affects: Palantir Gotham versions prior to 103.30221005.0.
References
Link | Resource |
---|---|
https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-10.md | Vendor Advisory |
https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-10.md | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-10.md - Vendor Advisory |
18 Jul 2023, 13:55
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-306 |
Information
Published : 2023-02-16 16:15
Updated : 2024-11-21 06:56
NVD link : CVE-2022-27891
Mitre link : CVE-2022-27891
CVE.ORG link : CVE-2022-27891
JSON object : View
Products Affected
palantir
- gotham