Lucene search

K
cve[email protected]CVE-2022-27891
HistoryFeb 16, 2023 - 4:15 p.m.

CVE-2022-27891

2023-02-1616:15:12
CWE-306
CWE-200
web.nvd.nist.gov
19
cve-2022-27891
palantir gotham
unauthenticated endpoint
username exposure
security patch
vulnerability fix
nvd

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.3%

Palantir Gotham included an unauthenticated endpoint that listed all active usernames on the stack with an active session. The affected services have been patched and automatically deployed to all Apollo-managed Gotham instances. It is highly recommended that customers upgrade all affected services to the latest version. This issue affects: Palantir Gotham versions prior to 103.30221005.0.

Affected configurations

NVD
Node
palantirgothamRange<3.22.10.4

CNA Affected

[
  {
    "vendor": "Palantir",
    "product": "Gotham",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "3.22.10.4",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

27.3%

Related for CVE-2022-27891