Skip to main content

CVE-2022-27894: CWE-79 Cross-site Scripting (XSS) in Palantir Foundry Blobster Service

Medium
VulnerabilityCVE-2022-27894cvecve-2022-27894cwe-79
Published: Fri Nov 04 2022 (11/04/2022, 17:15:11 UTC)
Source: CVE
Vendor/Project: Palantir
Product: Foundry Blobster Service

Description

The Foundry Blobster service was found to have a cross-site scripting (XSS) vulnerability that could have allowed an attacker with access to Foundry to launch attacks against other users. This vulnerability is resolved in Blobster 3.228.0.

AI-Powered Analysis

AILast updated: 06/26/2025, 02:44:29 UTC

Technical Analysis

CVE-2022-27894 is a medium-severity Cross-site Scripting (XSS) vulnerability identified in the Palantir Foundry Blobster Service. The vulnerability is classified under CWE-79, which involves improper neutralization of input leading to the execution of malicious scripts in the context of a victim user's browser. Specifically, this XSS flaw could allow an attacker who already has access to the Foundry platform to inject malicious scripts that execute in other users' browsers when they interact with the vulnerable Blobster service. This could lead to unauthorized actions performed on behalf of the victim user, such as session hijacking, data theft, or manipulation of the user interface. The vulnerability affects versions prior to 3.228.0, including versions up to and beyond 3.207.0, although the exact affected versions are unspecified. The CVSS v3.1 base score is 4.8, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the security scope of the vulnerable component. The impact metrics indicate low confidentiality and integrity impacts (C:L, I:L) and no impact on availability (A:N). No known exploits in the wild have been reported. The vulnerability was publicly disclosed on November 4, 2022, and has been addressed in Blobster version 3.228.0. Given the nature of the vulnerability, exploitation requires an attacker to have authenticated access to the Foundry platform and to trick other users into interacting with malicious content, which limits the attack surface but still poses a risk within organizations using this product.

Potential Impact

For European organizations using Palantir Foundry, particularly the Blobster service, this vulnerability could lead to targeted attacks within the organization where an insider or compromised user account could execute malicious scripts affecting other users. The impact includes potential exposure of sensitive data, unauthorized actions performed under the victim's credentials, and erosion of trust in the platform's integrity. Since Palantir Foundry is widely used in sectors such as government, finance, and critical infrastructure, the risk is amplified in environments handling sensitive or classified data. The requirement for authenticated access and user interaction reduces the likelihood of widespread exploitation but does not eliminate the risk of insider threats or targeted spear-phishing campaigns within organizations. The vulnerability could also be leveraged in multi-tenant environments where different organizational units share the same Foundry instance, potentially leading to cross-tenant attacks. Overall, the impact is moderate but significant in high-security environments prevalent in Europe, especially where Palantir Foundry is integrated into critical decision-making workflows.

Mitigation Recommendations

1. Immediate upgrade to Palantir Foundry Blobster Service version 3.228.0 or later, where the vulnerability is patched, is the most effective mitigation. 2. Implement strict access controls and monitoring to limit the number of users with high privileges (PR:H) on the Foundry platform, reducing the risk of malicious insiders exploiting this vulnerability. 3. Conduct user awareness training focused on recognizing and avoiding social engineering or phishing attempts that could trigger malicious script execution via user interaction. 4. Employ Content Security Policy (CSP) headers and other browser-based security mechanisms to restrict the execution of unauthorized scripts within the Foundry web interface. 5. Regularly audit and sanitize all user-generated content or inputs that interact with the Blobster service to prevent injection of malicious scripts. 6. Monitor logs and user activity for unusual behavior indicative of exploitation attempts, such as unexpected script execution or unauthorized actions performed by users. 7. For organizations operating multi-tenant Foundry instances, enforce tenant isolation and review inter-tenant communication channels to prevent cross-tenant attacks. 8. Coordinate with Palantir support for any additional vendor-specific recommendations or patches related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Palantir
Date Reserved
2022-03-25T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbebc3c

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 2:44:29 AM

Last updated: 7/31/2025, 9:08:02 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats