Skip to main content

CVE-2022-27895: CWE-532 Information Exposure Through Log Files in Palantir Foundry Build2

Medium
VulnerabilityCVE-2022-27895cvecve-2022-27895cwe-532
Published: Tue Nov 15 2022 (11/15/2022, 19:45:12 UTC)
Source: CVE
Vendor/Project: Palantir
Product: Foundry Build2

Description

Information Exposure Through Log Files vulnerability discovered in Foundry when logs were captured using an underlying library known as Build2. This issue was present in versions earlier than 1.785.0. Upgrade to Build2 version 1.785.0 or greater.

AI-Powered Analysis

AILast updated: 06/25/2025, 03:04:37 UTC

Technical Analysis

CVE-2022-27895 is an information exposure vulnerability identified in Palantir Foundry's Build2 component, specifically affecting versions prior to 1.785.0. The root cause stems from the way sensitive information is logged by an underlying library known as Build2. This vulnerability is categorized under CWE-532, which involves the inadvertent exposure of sensitive data through log files. When logging mechanisms capture sensitive data such as credentials, tokens, or personally identifiable information (PII) without proper sanitization or access controls, this data can be exposed to unauthorized users who have access to the logs. The CVSS v3.1 base score of 4.2 reflects a medium severity level, with the vector indicating that exploitation requires local access (AV:L), low attack complexity (AC:L), high privileges (PR:H), and user interaction (UI:R). The impact primarily concerns confidentiality, as the vulnerability allows unauthorized disclosure of sensitive information but does not affect integrity or availability. No known exploits have been reported in the wild, and the vendor has addressed the issue by releasing Build2 version 1.785.0 or later, which mitigates the logging exposure. Organizations using Palantir Foundry with Build2 versions older than 1.785.0 should prioritize upgrading to the patched version to prevent potential information leakage through logs. Given the nature of the vulnerability, attackers would need elevated privileges and some user interaction to exploit it, limiting its ease of exploitation but still posing a risk in environments where insider threats or compromised privileged accounts exist.

Potential Impact

For European organizations, the exposure of sensitive information through log files can have significant consequences, especially in sectors handling critical or regulated data such as finance, healthcare, and government. Unauthorized access to logs containing confidential data could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and potential financial penalties. Since Palantir Foundry is widely used for data integration, analytics, and operational intelligence, exposure of sensitive operational or personal data could undermine trust and disrupt business processes. The requirement for high privileges and user interaction reduces the likelihood of remote exploitation but does not eliminate risks from insider threats or compromised administrative accounts. Additionally, organizations with complex logging and monitoring infrastructures may inadvertently increase exposure if logs are replicated or stored in less secure environments. Therefore, the vulnerability could facilitate lateral movement within networks or aid attackers in gathering intelligence for further attacks.

Mitigation Recommendations

1. Immediate upgrade to Build2 version 1.785.0 or later to ensure the logging vulnerability is patched. 2. Conduct a thorough audit of existing log files to identify and securely delete or redact any sensitive information that may have been exposed. 3. Implement strict access controls and monitoring on log storage locations to limit access only to authorized personnel. 4. Review and harden logging configurations to avoid logging sensitive data wherever possible, including applying log sanitization techniques. 5. Employ encryption at rest and in transit for log files to protect data confidentiality. 6. Integrate log management solutions that support role-based access control (RBAC) and audit trails to detect unauthorized access attempts. 7. Train privileged users on the risks associated with logging sensitive information and enforce policies to minimize user interaction that could trigger exposure. 8. Regularly review and update incident response plans to include scenarios involving information exposure through logs. 9. Monitor for unusual access patterns or privilege escalations that could indicate attempts to exploit this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Palantir
Date Reserved
2022-03-25T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983cc4522896dcbee77f

Added to database: 5/21/2025, 9:09:16 AM

Last enriched: 6/25/2025, 3:04:37 AM

Last updated: 7/9/2025, 10:28:19 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats