CVE-2022-27890
CVSS V2 None
CVSS V3 None
Description
It was discovered that the sls-logging was not verifying hostnames in TLS certificates due to a misuse of the javax.net.ssl.SSLSocketFactory API. A malicious attacker in a privileged network position could abuse this to perform a man-in-the-middle attack. A successful man-in-the-middle attack would allow them to intercept, read, or modify network communications to and from the affected service. In the case of AtlasDB, the vulnerability was mitigated by other network controls such as two-way TLS when deployed as part of a Palantir platform. Palantir still recommends upgrading to a non-vulnerable version out of an abundance of caution.
Overview
- CVE ID
- CVE-2022-27890
- Assigner
- cve-coordination@palantir.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-02-16T16:15:11
- Last Modified Date
- 2023-02-27T17:42:55
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:palantir:atlasdb:*:*:*:*:*:*:*:* | 1 | OR | 0.730.0 |
References
Reference URL | Reference Tags |
---|---|
https://github.com/palantir/security-bulletins/blob/main/PLTRSEC-2022-15.md | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-27890 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27890 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 07:50:07 | Added to TrackCVE | |||
2023-04-17 07:50:09 | Weakness Enumeration | new |