Palantir Gotham included an unauthenticated endpoint that listed all active usernames on the stack with an active session. The affected services have been patched and automatically deployed to all Apollo-managed Gotham instances. It is highly recommended that customers upgrade all affected services to the latest version. This issue affects: Palantir Gotham versions prior to 103.30221005.0.
References
Link | Resource |
---|---|
https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-10.md | Vendor Advisory |
Configurations
Information
Published : 2023-02-16 08:15
Updated : 2023-02-24 19:27
NVD link : CVE-2022-27891
Mitre link : CVE-2022-27891
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
palantir
- gotham