CVE-2022-27893: CWE-532 Information Exposure Through Log Files in Palantir Foundry Magritte plugin osisoft-pi-web-connector
The Foundry Magritte plugin osisoft-pi-web-connector versions 0.15.0 - 0.43.0 was found to be logging in a manner that captured authentication requests. This vulnerability is resolved in osisoft-pi-web-connector version 0.44.0.
AI Analysis
Technical Summary
CVE-2022-27893 is a medium-severity vulnerability identified in the Palantir Foundry Magritte plugin named osisoft-pi-web-connector, specifically affecting versions from 0.15.0 up to 0.43.0. The vulnerability is categorized under CWE-532, which refers to information exposure through log files. The core issue arises from the plugin's logging mechanism capturing sensitive authentication request data, potentially including credentials or tokens, within log files. These logs, if accessed by unauthorized parties, could lead to credential disclosure without requiring direct exploitation of the system itself. The vulnerability requires local access (AV:L) and privileges (PR:H) with user interaction (UI:R) to be triggered, indicating that an attacker or insider with elevated privileges and some interaction with the system could cause sensitive authentication data to be logged. The vulnerability does not impact the integrity or availability of the system but poses a significant confidentiality risk. The issue was resolved in version 0.44.0 of the osisoft-pi-web-connector plugin, where logging practices were presumably corrected to avoid capturing sensitive authentication information. No known exploits are reported in the wild, and the CVSS v3.1 base score is 4.2, reflecting a medium severity level due to the combination of local attack vector, required privileges, and user interaction. This vulnerability is particularly relevant to organizations using Palantir Foundry with the Magritte plugin integrating OSIsoft PI Web Connector, which is commonly used for industrial data management and operational intelligence, especially in sectors like manufacturing, energy, and utilities.
Potential Impact
For European organizations, the exposure of authentication credentials through log files can lead to unauthorized access if logs are improperly secured or accessed by malicious insiders or attackers who gain local access. Given that Palantir Foundry and OSIsoft PI systems are often deployed in critical infrastructure sectors such as energy, manufacturing, and utilities, the confidentiality breach could facilitate lateral movement within networks, data exfiltration, or sabotage. While the vulnerability does not directly affect system integrity or availability, the compromise of authentication data can indirectly lead to more severe attacks. The risk is heightened in environments where log files are centralized or aggregated without strict access controls, increasing the attack surface. European organizations subject to stringent data protection regulations (e.g., GDPR) may face compliance risks if sensitive information is exposed. Additionally, sectors critical to national infrastructure could be targeted by threat actors seeking to disrupt operations or conduct espionage, making this vulnerability a concern for entities managing industrial control systems or operational technology environments.
Mitigation Recommendations
1. Immediate upgrade to osisoft-pi-web-connector version 0.44.0 or later to ensure the logging vulnerability is patched. 2. Conduct a thorough audit of existing log files to identify and securely delete any logs containing sensitive authentication data to prevent retrospective exposure. 3. Implement strict access controls and monitoring on log storage locations, ensuring only authorized personnel have access, and enable audit logging for access to these logs. 4. Employ log management solutions that support encryption at rest and in transit to protect log data confidentiality. 5. Review and harden logging configurations across the Palantir Foundry environment to avoid logging sensitive information, applying the principle of least privilege in logging verbosity. 6. Train system administrators and operators on secure handling of logs and the risks associated with sensitive data exposure. 7. Integrate regular vulnerability scanning and configuration reviews specifically targeting logging practices in industrial and operational technology software components. 8. Consider network segmentation and enhanced monitoring around systems running the affected plugin to detect any anomalous access patterns that might indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden, Belgium, Spain, Poland, Finland
CVE-2022-27893: CWE-532 Information Exposure Through Log Files in Palantir Foundry Magritte plugin osisoft-pi-web-connector
Description
The Foundry Magritte plugin osisoft-pi-web-connector versions 0.15.0 - 0.43.0 was found to be logging in a manner that captured authentication requests. This vulnerability is resolved in osisoft-pi-web-connector version 0.44.0.
AI-Powered Analysis
Technical Analysis
CVE-2022-27893 is a medium-severity vulnerability identified in the Palantir Foundry Magritte plugin named osisoft-pi-web-connector, specifically affecting versions from 0.15.0 up to 0.43.0. The vulnerability is categorized under CWE-532, which refers to information exposure through log files. The core issue arises from the plugin's logging mechanism capturing sensitive authentication request data, potentially including credentials or tokens, within log files. These logs, if accessed by unauthorized parties, could lead to credential disclosure without requiring direct exploitation of the system itself. The vulnerability requires local access (AV:L) and privileges (PR:H) with user interaction (UI:R) to be triggered, indicating that an attacker or insider with elevated privileges and some interaction with the system could cause sensitive authentication data to be logged. The vulnerability does not impact the integrity or availability of the system but poses a significant confidentiality risk. The issue was resolved in version 0.44.0 of the osisoft-pi-web-connector plugin, where logging practices were presumably corrected to avoid capturing sensitive authentication information. No known exploits are reported in the wild, and the CVSS v3.1 base score is 4.2, reflecting a medium severity level due to the combination of local attack vector, required privileges, and user interaction. This vulnerability is particularly relevant to organizations using Palantir Foundry with the Magritte plugin integrating OSIsoft PI Web Connector, which is commonly used for industrial data management and operational intelligence, especially in sectors like manufacturing, energy, and utilities.
Potential Impact
For European organizations, the exposure of authentication credentials through log files can lead to unauthorized access if logs are improperly secured or accessed by malicious insiders or attackers who gain local access. Given that Palantir Foundry and OSIsoft PI systems are often deployed in critical infrastructure sectors such as energy, manufacturing, and utilities, the confidentiality breach could facilitate lateral movement within networks, data exfiltration, or sabotage. While the vulnerability does not directly affect system integrity or availability, the compromise of authentication data can indirectly lead to more severe attacks. The risk is heightened in environments where log files are centralized or aggregated without strict access controls, increasing the attack surface. European organizations subject to stringent data protection regulations (e.g., GDPR) may face compliance risks if sensitive information is exposed. Additionally, sectors critical to national infrastructure could be targeted by threat actors seeking to disrupt operations or conduct espionage, making this vulnerability a concern for entities managing industrial control systems or operational technology environments.
Mitigation Recommendations
1. Immediate upgrade to osisoft-pi-web-connector version 0.44.0 or later to ensure the logging vulnerability is patched. 2. Conduct a thorough audit of existing log files to identify and securely delete any logs containing sensitive authentication data to prevent retrospective exposure. 3. Implement strict access controls and monitoring on log storage locations, ensuring only authorized personnel have access, and enable audit logging for access to these logs. 4. Employ log management solutions that support encryption at rest and in transit to protect log data confidentiality. 5. Review and harden logging configurations across the Palantir Foundry environment to avoid logging sensitive information, applying the principle of least privilege in logging verbosity. 6. Train system administrators and operators on secure handling of logs and the risks associated with sensitive data exposure. 7. Integrate regular vulnerability scanning and configuration reviews specifically targeting logging practices in industrial and operational technology software components. 8. Consider network segmentation and enhanced monitoring around systems running the affected plugin to detect any anomalous access patterns that might indicate exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Palantir
- Date Reserved
- 2022-03-25T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbebc21
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 2:44:47 AM
Last updated: 8/17/2025, 9:51:02 AM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.