CVE-2022-27895: CWE-532 Information Exposure Through Log Files in Palantir Foundry Build2
Information Exposure Through Log Files vulnerability discovered in Foundry when logs were captured using an underlying library known as Build2. This issue was present in versions earlier than 1.785.0. Upgrade to Build2 version 1.785.0 or greater.
AI Analysis
Technical Summary
CVE-2022-27895 is an information exposure vulnerability identified in Palantir Foundry's Build2 component, specifically affecting versions prior to 1.785.0. The root cause stems from the way sensitive information is logged by an underlying library known as Build2. This vulnerability is categorized under CWE-532, which involves the inadvertent exposure of sensitive data through log files. When logging mechanisms capture sensitive data such as credentials, tokens, or personally identifiable information (PII) without proper sanitization or access controls, this data can be exposed to unauthorized users who have access to the logs. The CVSS v3.1 base score of 4.2 reflects a medium severity level, with the vector indicating that exploitation requires local access (AV:L), low attack complexity (AC:L), high privileges (PR:H), and user interaction (UI:R). The impact primarily concerns confidentiality, as the vulnerability allows unauthorized disclosure of sensitive information but does not affect integrity or availability. No known exploits have been reported in the wild, and the vendor has addressed the issue by releasing Build2 version 1.785.0 or later, which mitigates the logging exposure. Organizations using Palantir Foundry with Build2 versions older than 1.785.0 should prioritize upgrading to the patched version to prevent potential information leakage through logs. Given the nature of the vulnerability, attackers would need elevated privileges and some user interaction to exploit it, limiting its ease of exploitation but still posing a risk in environments where insider threats or compromised privileged accounts exist.
Potential Impact
For European organizations, the exposure of sensitive information through log files can have significant consequences, especially in sectors handling critical or regulated data such as finance, healthcare, and government. Unauthorized access to logs containing confidential data could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential financial penalties. Since Palantir Foundry is widely used for data integration, analytics, and operational intelligence, exposure of sensitive operational or personal data could undermine trust and disrupt business processes. The requirement for high privileges and user interaction reduces the likelihood of remote exploitation but does not eliminate risks from insider threats or compromised administrative accounts. Additionally, organizations with complex logging and monitoring infrastructures may inadvertently increase exposure if logs are replicated or stored in less secure environments. Therefore, the vulnerability could facilitate lateral movement within networks or aid attackers in gathering intelligence for further attacks.
Mitigation Recommendations
1. Immediate upgrade to Build2 version 1.785.0 or later to ensure the logging vulnerability is patched. 2. Conduct a thorough audit of existing log files to identify and securely delete or redact any sensitive information that may have been exposed. 3. Implement strict access controls and monitoring on log storage locations to limit access only to authorized personnel. 4. Review and harden logging configurations to avoid logging sensitive data wherever possible, including applying log sanitization techniques. 5. Employ encryption at rest and in transit for log files to protect data confidentiality. 6. Integrate log management solutions that support role-based access control (RBAC) and audit trails to detect unauthorized access attempts. 7. Train privileged users on the risks associated with logging sensitive information and enforce policies to minimize user interaction that could trigger exposure. 8. Regularly review and update incident response plans to include scenarios involving information exposure through logs. 9. Monitor for unusual access patterns or privilege escalations that could indicate attempts to exploit this vulnerability.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Switzerland, Belgium
CVE-2022-27895: CWE-532 Information Exposure Through Log Files in Palantir Foundry Build2
Description
Information Exposure Through Log Files vulnerability discovered in Foundry when logs were captured using an underlying library known as Build2. This issue was present in versions earlier than 1.785.0. Upgrade to Build2 version 1.785.0 or greater.
AI-Powered Analysis
Technical Analysis
CVE-2022-27895 is an information exposure vulnerability identified in Palantir Foundry's Build2 component, specifically affecting versions prior to 1.785.0. The root cause stems from the way sensitive information is logged by an underlying library known as Build2. This vulnerability is categorized under CWE-532, which involves the inadvertent exposure of sensitive data through log files. When logging mechanisms capture sensitive data such as credentials, tokens, or personally identifiable information (PII) without proper sanitization or access controls, this data can be exposed to unauthorized users who have access to the logs. The CVSS v3.1 base score of 4.2 reflects a medium severity level, with the vector indicating that exploitation requires local access (AV:L), low attack complexity (AC:L), high privileges (PR:H), and user interaction (UI:R). The impact primarily concerns confidentiality, as the vulnerability allows unauthorized disclosure of sensitive information but does not affect integrity or availability. No known exploits have been reported in the wild, and the vendor has addressed the issue by releasing Build2 version 1.785.0 or later, which mitigates the logging exposure. Organizations using Palantir Foundry with Build2 versions older than 1.785.0 should prioritize upgrading to the patched version to prevent potential information leakage through logs. Given the nature of the vulnerability, attackers would need elevated privileges and some user interaction to exploit it, limiting its ease of exploitation but still posing a risk in environments where insider threats or compromised privileged accounts exist.
Potential Impact
For European organizations, the exposure of sensitive information through log files can have significant consequences, especially in sectors handling critical or regulated data such as finance, healthcare, and government. Unauthorized access to logs containing confidential data could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential financial penalties. Since Palantir Foundry is widely used for data integration, analytics, and operational intelligence, exposure of sensitive operational or personal data could undermine trust and disrupt business processes. The requirement for high privileges and user interaction reduces the likelihood of remote exploitation but does not eliminate risks from insider threats or compromised administrative accounts. Additionally, organizations with complex logging and monitoring infrastructures may inadvertently increase exposure if logs are replicated or stored in less secure environments. Therefore, the vulnerability could facilitate lateral movement within networks or aid attackers in gathering intelligence for further attacks.
Mitigation Recommendations
1. Immediate upgrade to Build2 version 1.785.0 or later to ensure the logging vulnerability is patched. 2. Conduct a thorough audit of existing log files to identify and securely delete or redact any sensitive information that may have been exposed. 3. Implement strict access controls and monitoring on log storage locations to limit access only to authorized personnel. 4. Review and harden logging configurations to avoid logging sensitive data wherever possible, including applying log sanitization techniques. 5. Employ encryption at rest and in transit for log files to protect data confidentiality. 6. Integrate log management solutions that support role-based access control (RBAC) and audit trails to detect unauthorized access attempts. 7. Train privileged users on the risks associated with logging sensitive information and enforce policies to minimize user interaction that could trigger exposure. 8. Regularly review and update incident response plans to include scenarios involving information exposure through logs. 9. Monitor for unusual access patterns or privilege escalations that could indicate attempts to exploit this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Palantir
- Date Reserved
- 2022-03-25T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983cc4522896dcbee77f
Added to database: 5/21/2025, 9:09:16 AM
Last enriched: 6/25/2025, 3:04:37 AM
Last updated: 7/9/2025, 10:28:19 PM
Views: 8
Related Threats
CVE-2025-7564: Hard-coded Credentials in LB-LINK BL-AC3600
HighCVE-2025-7563: SQL Injection in PHPGurukul Online Fire Reporting System
MediumCVE-2025-7562: SQL Injection in PHPGurukul Online Fire Reporting System
MediumCVE-2025-7451: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Hgiga iSherlock
CriticalCVE-2025-7561: SQL Injection in PHPGurukul Online Fire Reporting System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.