Vulnerability Description
Palantir Gotham included an unauthenticated endpoint that listed all active usernames on the stack with an active session. The affected services have been patched and automatically deployed to all Apollo-managed Gotham instances. It is highly recommended that customers upgrade all affected services to the latest version. This issue affects: Palantir Gotham versions prior to 103.30221005.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Palantir | Gotham | < 3.22.10.4 |
Related Weaknesses (CWE)
References
- https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-10.mdVendor Advisory
- https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-10.mdVendor Advisory
FAQ
What is CVE-2022-27891?
CVE-2022-27891 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Palantir Gotham included an unauthenticated endpoint that listed all active usernames on the stack with an active session. The affected services have been patched and automatically deployed to all Apo...
How severe is CVE-2022-27891?
CVE-2022-27891 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-27891?
Check the references section above for vendor advisories and patch information. Affected products include: Palantir Gotham.