Skip to main content

CVE-2022-27893: CWE-532 Information Exposure Through Log Files in Palantir Foundry Magritte plugin osisoft-pi-web-connector

Medium
VulnerabilityCVE-2022-27893cvecve-2022-27893cwe-532
Published: Fri Nov 04 2022 (11/04/2022, 16:05:08 UTC)
Source: CVE
Vendor/Project: Palantir
Product: Foundry Magritte plugin osisoft-pi-web-connector

Description

The Foundry Magritte plugin osisoft-pi-web-connector versions 0.15.0 - 0.43.0 was found to be logging in a manner that captured authentication requests. This vulnerability is resolved in osisoft-pi-web-connector version 0.44.0.

AI-Powered Analysis

AILast updated: 06/26/2025, 02:44:47 UTC

Technical Analysis

CVE-2022-27893 is a medium-severity vulnerability identified in the Palantir Foundry Magritte plugin named osisoft-pi-web-connector, specifically affecting versions from 0.15.0 up to 0.43.0. The vulnerability is categorized under CWE-532, which refers to information exposure through log files. The core issue arises from the plugin's logging mechanism capturing sensitive authentication request data, potentially including credentials or tokens, within log files. These logs, if accessed by unauthorized parties, could lead to credential disclosure without requiring direct exploitation of the system itself. The vulnerability requires local access (AV:L) and privileges (PR:H) with user interaction (UI:R) to be triggered, indicating that an attacker or insider with elevated privileges and some interaction with the system could cause sensitive authentication data to be logged. The vulnerability does not impact the integrity or availability of the system but poses a significant confidentiality risk. The issue was resolved in version 0.44.0 of the osisoft-pi-web-connector plugin, where logging practices were presumably corrected to avoid capturing sensitive authentication information. No known exploits are reported in the wild, and the CVSS v3.1 base score is 4.2, reflecting a medium severity level due to the combination of local attack vector, required privileges, and user interaction. This vulnerability is particularly relevant to organizations using Palantir Foundry with the Magritte plugin integrating OSIsoft PI Web Connector, which is commonly used for industrial data management and operational intelligence, especially in sectors like manufacturing, energy, and utilities.

Potential Impact

For European organizations, the exposure of authentication credentials through log files can lead to unauthorized access if logs are improperly secured or accessed by malicious insiders or attackers who gain local access. Given that Palantir Foundry and OSIsoft PI systems are often deployed in critical infrastructure sectors such as energy, manufacturing, and utilities, the confidentiality breach could facilitate lateral movement within networks, data exfiltration, or sabotage. While the vulnerability does not directly affect system integrity or availability, the compromise of authentication data can indirectly lead to more severe attacks. The risk is heightened in environments where log files are centralized or aggregated without strict access controls, increasing the attack surface. European organizations subject to stringent data protection regulations (e.g., GDPR) may face compliance risks if sensitive information is exposed. Additionally, sectors critical to national infrastructure could be targeted by threat actors seeking to disrupt operations or conduct espionage, making this vulnerability a concern for entities managing industrial control systems or operational technology environments.

Mitigation Recommendations

1. Immediate upgrade to osisoft-pi-web-connector version 0.44.0 or later to ensure the logging vulnerability is patched. 2. Conduct a thorough audit of existing log files to identify and securely delete any logs containing sensitive authentication data to prevent retrospective exposure. 3. Implement strict access controls and monitoring on log storage locations, ensuring only authorized personnel have access, and enable audit logging for access to these logs. 4. Employ log management solutions that support encryption at rest and in transit to protect log data confidentiality. 5. Review and harden logging configurations across the Palantir Foundry environment to avoid logging sensitive information, applying the principle of least privilege in logging verbosity. 6. Train system administrators and operators on secure handling of logs and the risks associated with sensitive data exposure. 7. Integrate regular vulnerability scanning and configuration reviews specifically targeting logging practices in industrial and operational technology software components. 8. Consider network segmentation and enhanced monitoring around systems running the affected plugin to detect any anomalous access patterns that might indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Palantir
Date Reserved
2022-03-25T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbebc21

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 2:44:47 AM

Last updated: 8/17/2025, 9:51:02 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats