CVE-2022-27896: CWE-532 Information Exposure Through Log Files in Palantir Foundry Code-Workbooks
Information Exposure Through Log Files vulnerability discovered in Foundry Code-Workbooks where the endpoint backing that console was generating service log records of any Python code being run. These service logs included the Foundry token that represents the Code-Workbooks Python console. Upgrade to Code-Workbooks version 4.461.0. This issue affects Palantir Foundry Code-Workbooks version 4.144 to version 4.460.0 and is resolved in 4.461.0.
AI Analysis
Technical Summary
CVE-2022-27896 is an information exposure vulnerability classified under CWE-532, affecting Palantir Foundry Code-Workbooks versions 4.144 through 4.460.0. The vulnerability arises because the endpoint supporting the Code-Workbooks Python console generates service log records that include any Python code executed within the console. Critically, these logs contain the Foundry token associated with the Python console session. This token is a sensitive credential that can grant access to the Code-Workbooks environment, potentially allowing unauthorized users to impersonate legitimate sessions or escalate privileges. The vulnerability does not directly impact the integrity or availability of the system but poses a significant confidentiality risk due to the exposure of authentication tokens. Exploitation requires local access (AV:L) with high privileges (PR:H) and user interaction (UI:R), which reduces the ease of exploitation but does not eliminate risk, especially in environments where multiple users share access or where logs might be accessible by less privileged users or attackers who have gained partial access. The issue was resolved in version 4.461.0 of Code-Workbooks, and users are advised to upgrade to this or later versions to mitigate the risk. No known exploits have been reported in the wild to date, but the presence of sensitive tokens in logs is a notable security concern that could be leveraged in targeted attacks or insider threat scenarios.
Potential Impact
For European organizations using Palantir Foundry Code-Workbooks, this vulnerability primarily threatens the confidentiality of sensitive data and credentials. Exposure of Foundry tokens could allow attackers or unauthorized insiders to access or manipulate data within the Code-Workbooks environment, potentially leading to unauthorized data access or lateral movement within the organization's infrastructure. Given that Palantir Foundry is often used in data analytics and decision-making processes across sectors such as finance, government, and critical infrastructure, the compromise of tokens could have cascading effects on data privacy compliance (e.g., GDPR) and operational security. Although the vulnerability does not directly affect system integrity or availability, the potential for unauthorized access to sensitive analytics environments could undermine trust and lead to regulatory penalties or reputational damage. The requirement for high privileges and user interaction limits the attack surface but does not eliminate risk, especially in complex enterprise environments where logs might be aggregated or accessible by multiple teams or systems.
Mitigation Recommendations
1. Immediate upgrade to Palantir Foundry Code-Workbooks version 4.461.0 or later to eliminate the vulnerability. 2. Review and restrict access permissions to service log files to ensure only authorized personnel and systems can read them, minimizing the risk of token exposure. 3. Implement log management best practices such as log redaction or filtering to prevent sensitive tokens from being recorded in logs. 4. Conduct audits of existing logs to identify and securely purge any logs containing exposed tokens. 5. Enforce strict session management and token expiration policies within Foundry to limit the window of opportunity for token misuse. 6. Monitor for unusual access patterns or token usage that could indicate exploitation attempts. 7. Educate administrators and users about the risks of token exposure and the importance of secure handling of logs and credentials. 8. Consider network segmentation and access controls to limit the exposure of the logging infrastructure and the Code-Workbooks environment.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Belgium, Italy
CVE-2022-27896: CWE-532 Information Exposure Through Log Files in Palantir Foundry Code-Workbooks
Description
Information Exposure Through Log Files vulnerability discovered in Foundry Code-Workbooks where the endpoint backing that console was generating service log records of any Python code being run. These service logs included the Foundry token that represents the Code-Workbooks Python console. Upgrade to Code-Workbooks version 4.461.0. This issue affects Palantir Foundry Code-Workbooks version 4.144 to version 4.460.0 and is resolved in 4.461.0.
AI-Powered Analysis
Technical Analysis
CVE-2022-27896 is an information exposure vulnerability classified under CWE-532, affecting Palantir Foundry Code-Workbooks versions 4.144 through 4.460.0. The vulnerability arises because the endpoint supporting the Code-Workbooks Python console generates service log records that include any Python code executed within the console. Critically, these logs contain the Foundry token associated with the Python console session. This token is a sensitive credential that can grant access to the Code-Workbooks environment, potentially allowing unauthorized users to impersonate legitimate sessions or escalate privileges. The vulnerability does not directly impact the integrity or availability of the system but poses a significant confidentiality risk due to the exposure of authentication tokens. Exploitation requires local access (AV:L) with high privileges (PR:H) and user interaction (UI:R), which reduces the ease of exploitation but does not eliminate risk, especially in environments where multiple users share access or where logs might be accessible by less privileged users or attackers who have gained partial access. The issue was resolved in version 4.461.0 of Code-Workbooks, and users are advised to upgrade to this or later versions to mitigate the risk. No known exploits have been reported in the wild to date, but the presence of sensitive tokens in logs is a notable security concern that could be leveraged in targeted attacks or insider threat scenarios.
Potential Impact
For European organizations using Palantir Foundry Code-Workbooks, this vulnerability primarily threatens the confidentiality of sensitive data and credentials. Exposure of Foundry tokens could allow attackers or unauthorized insiders to access or manipulate data within the Code-Workbooks environment, potentially leading to unauthorized data access or lateral movement within the organization's infrastructure. Given that Palantir Foundry is often used in data analytics and decision-making processes across sectors such as finance, government, and critical infrastructure, the compromise of tokens could have cascading effects on data privacy compliance (e.g., GDPR) and operational security. Although the vulnerability does not directly affect system integrity or availability, the potential for unauthorized access to sensitive analytics environments could undermine trust and lead to regulatory penalties or reputational damage. The requirement for high privileges and user interaction limits the attack surface but does not eliminate risk, especially in complex enterprise environments where logs might be aggregated or accessible by multiple teams or systems.
Mitigation Recommendations
1. Immediate upgrade to Palantir Foundry Code-Workbooks version 4.461.0 or later to eliminate the vulnerability. 2. Review and restrict access permissions to service log files to ensure only authorized personnel and systems can read them, minimizing the risk of token exposure. 3. Implement log management best practices such as log redaction or filtering to prevent sensitive tokens from being recorded in logs. 4. Conduct audits of existing logs to identify and securely purge any logs containing exposed tokens. 5. Enforce strict session management and token expiration policies within Foundry to limit the window of opportunity for token misuse. 6. Monitor for unusual access patterns or token usage that could indicate exploitation attempts. 7. Educate administrators and users about the risks of token exposure and the importance of secure handling of logs and credentials. 8. Consider network segmentation and access controls to limit the exposure of the logging infrastructure and the Code-Workbooks environment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Palantir
- Date Reserved
- 2022-03-25T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbedf6a
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 6/25/2025, 7:17:11 AM
Last updated: 8/11/2025, 1:02:35 AM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.