CVE-2022-27894: CWE-79 Cross-site Scripting (XSS) in Palantir Foundry Blobster Service
The Foundry Blobster service was found to have a cross-site scripting (XSS) vulnerability that could have allowed an attacker with access to Foundry to launch attacks against other users. This vulnerability is resolved in Blobster 3.228.0.
AI Analysis
Technical Summary
CVE-2022-27894 is a medium-severity Cross-site Scripting (XSS) vulnerability identified in the Palantir Foundry Blobster Service. The vulnerability is classified under CWE-79, which involves improper neutralization of input leading to the execution of malicious scripts in the context of a victim user's browser. Specifically, this XSS flaw could allow an attacker who already has access to the Foundry platform to inject malicious scripts that execute in other users' browsers when they interact with the vulnerable Blobster service. This could lead to unauthorized actions performed on behalf of the victim user, such as session hijacking, data theft, or manipulation of the user interface. The vulnerability affects versions prior to 3.228.0, including versions up to and beyond 3.207.0, although the exact affected versions are unspecified. The CVSS v3.1 base score is 4.8, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the security scope of the vulnerable component. The impact metrics indicate low confidentiality and integrity impacts (C:L, I:L) and no impact on availability (A:N). No known exploits in the wild have been reported. The vulnerability was publicly disclosed on November 4, 2022, and has been addressed in Blobster version 3.228.0. Given the nature of the vulnerability, exploitation requires an attacker to have authenticated access to the Foundry platform and to trick other users into interacting with malicious content, which limits the attack surface but still poses a risk within organizations using this product.
Potential Impact
For European organizations using Palantir Foundry, particularly the Blobster service, this vulnerability could lead to targeted attacks within the organization where an insider or compromised user account could execute malicious scripts affecting other users. The impact includes potential exposure of sensitive data, unauthorized actions performed under the victim's credentials, and erosion of trust in the platform's integrity. Since Palantir Foundry is widely used in sectors such as government, finance, and critical infrastructure, the risk is amplified in environments handling sensitive or classified data. The requirement for authenticated access and user interaction reduces the likelihood of widespread exploitation but does not eliminate the risk of insider threats or targeted spear-phishing campaigns within organizations. The vulnerability could also be leveraged in multi-tenant environments where different organizational units share the same Foundry instance, potentially leading to cross-tenant attacks. Overall, the impact is moderate but significant in high-security environments prevalent in Europe, especially where Palantir Foundry is integrated into critical decision-making workflows.
Mitigation Recommendations
1. Immediate upgrade to Palantir Foundry Blobster Service version 3.228.0 or later, where the vulnerability is patched, is the most effective mitigation. 2. Implement strict access controls and monitoring to limit the number of users with high privileges (PR:H) on the Foundry platform, reducing the risk of malicious insiders exploiting this vulnerability. 3. Conduct user awareness training focused on recognizing and avoiding social engineering or phishing attempts that could trigger malicious script execution via user interaction. 4. Employ Content Security Policy (CSP) headers and other browser-based security mechanisms to restrict the execution of unauthorized scripts within the Foundry web interface. 5. Regularly audit and sanitize all user-generated content or inputs that interact with the Blobster service to prevent injection of malicious scripts. 6. Monitor logs and user activity for unusual behavior indicative of exploitation attempts, such as unexpected script execution or unauthorized actions performed by users. 7. For organizations operating multi-tenant Foundry instances, enforce tenant isolation and review inter-tenant communication channels to prevent cross-tenant attacks. 8. Coordinate with Palantir support for any additional vendor-specific recommendations or patches related to this vulnerability.
Affected Countries
United Kingdom, Germany, France, Netherlands, Belgium, Sweden, Italy
CVE-2022-27894: CWE-79 Cross-site Scripting (XSS) in Palantir Foundry Blobster Service
Description
The Foundry Blobster service was found to have a cross-site scripting (XSS) vulnerability that could have allowed an attacker with access to Foundry to launch attacks against other users. This vulnerability is resolved in Blobster 3.228.0.
AI-Powered Analysis
Technical Analysis
CVE-2022-27894 is a medium-severity Cross-site Scripting (XSS) vulnerability identified in the Palantir Foundry Blobster Service. The vulnerability is classified under CWE-79, which involves improper neutralization of input leading to the execution of malicious scripts in the context of a victim user's browser. Specifically, this XSS flaw could allow an attacker who already has access to the Foundry platform to inject malicious scripts that execute in other users' browsers when they interact with the vulnerable Blobster service. This could lead to unauthorized actions performed on behalf of the victim user, such as session hijacking, data theft, or manipulation of the user interface. The vulnerability affects versions prior to 3.228.0, including versions up to and beyond 3.207.0, although the exact affected versions are unspecified. The CVSS v3.1 base score is 4.8, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the security scope of the vulnerable component. The impact metrics indicate low confidentiality and integrity impacts (C:L, I:L) and no impact on availability (A:N). No known exploits in the wild have been reported. The vulnerability was publicly disclosed on November 4, 2022, and has been addressed in Blobster version 3.228.0. Given the nature of the vulnerability, exploitation requires an attacker to have authenticated access to the Foundry platform and to trick other users into interacting with malicious content, which limits the attack surface but still poses a risk within organizations using this product.
Potential Impact
For European organizations using Palantir Foundry, particularly the Blobster service, this vulnerability could lead to targeted attacks within the organization where an insider or compromised user account could execute malicious scripts affecting other users. The impact includes potential exposure of sensitive data, unauthorized actions performed under the victim's credentials, and erosion of trust in the platform's integrity. Since Palantir Foundry is widely used in sectors such as government, finance, and critical infrastructure, the risk is amplified in environments handling sensitive or classified data. The requirement for authenticated access and user interaction reduces the likelihood of widespread exploitation but does not eliminate the risk of insider threats or targeted spear-phishing campaigns within organizations. The vulnerability could also be leveraged in multi-tenant environments where different organizational units share the same Foundry instance, potentially leading to cross-tenant attacks. Overall, the impact is moderate but significant in high-security environments prevalent in Europe, especially where Palantir Foundry is integrated into critical decision-making workflows.
Mitigation Recommendations
1. Immediate upgrade to Palantir Foundry Blobster Service version 3.228.0 or later, where the vulnerability is patched, is the most effective mitigation. 2. Implement strict access controls and monitoring to limit the number of users with high privileges (PR:H) on the Foundry platform, reducing the risk of malicious insiders exploiting this vulnerability. 3. Conduct user awareness training focused on recognizing and avoiding social engineering or phishing attempts that could trigger malicious script execution via user interaction. 4. Employ Content Security Policy (CSP) headers and other browser-based security mechanisms to restrict the execution of unauthorized scripts within the Foundry web interface. 5. Regularly audit and sanitize all user-generated content or inputs that interact with the Blobster service to prevent injection of malicious scripts. 6. Monitor logs and user activity for unusual behavior indicative of exploitation attempts, such as unexpected script execution or unauthorized actions performed by users. 7. For organizations operating multi-tenant Foundry instances, enforce tenant isolation and review inter-tenant communication channels to prevent cross-tenant attacks. 8. Coordinate with Palantir support for any additional vendor-specific recommendations or patches related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Palantir
- Date Reserved
- 2022-03-25T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbebc3c
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 2:44:29 AM
Last updated: 7/31/2025, 9:08:02 AM
Views: 9
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.