First published: Thu Feb 16 2023(Updated: )
Palantir Gotham included an unauthenticated endpoint that listed all active usernames on the stack with an active session. The affected services have been patched and automatically deployed to all Apollo-managed Gotham instances. It is highly recommended that customers upgrade all affected services to the latest version. This issue affects: Palantir Gotham versions prior to 103.30221005.0.
Credit: cve-coordination@palantir.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palantir Gotham | <3.22.10.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-27891.
The severity level of CVE-2022-27891 is medium with a CVSS score of 5.3.
The affected software is Palantir Gotham up to version 3.22.10.4.
Yes, the affected services have been patched and automatically deployed to all Apollo-managed Gotham instances.
More information about CVE-2022-27891 can be found at the following reference link: [security-bulletins](https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-10.md).