CVE-2024-49581

6.5 MEDIUM

📋 TL;DR

CVE-2024-49581 is an authorization bypass vulnerability in Palantir Foundry's Object Explorer where users without proper permissions could view restricted objects under specific circumstances. This only affected authenticated users within the same organization and did not allow cross-organizational or unauthenticated access. The vulnerability has been patched and automatically deployed to all Apollo-managed Foundry instances.

💻 Affected Systems

Products:
  • Palantir Foundry
Versions: Specific versions not disclosed in advisory
Operating Systems: Not OS-specific - cloud service
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Apollo-managed Foundry instances. The vulnerability existed in the Object Explorer component for restricted views backed objects (OSV1).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authorized users could access sensitive restricted objects they shouldn't have permission to view, potentially exposing confidential business data or intellectual property.

🟠

Likely Case

Users with some access privileges could inadvertently or intentionally view additional restricted objects beyond their intended permissions, leading to data exposure within organizational boundaries.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to potential unauthorized viewing of some restricted objects by authenticated users who already have some level of system access.

🌐 Internet-Facing: LOW - The vulnerability requires authentication and affects internal object viewing functionality, not directly internet-exposed services.
🏢 Internal Only: MEDIUM - While authentication is required, internal users could bypass authorization controls to view restricted objects they shouldn't access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific circumstances and authenticated access. The advisory indicates it was a software bug in authorization logic for object viewing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Automatically deployed patch (specific version not disclosed)

Vendor Advisory: https://palantir.safebase.us/?tcuUid=b60db1ee-4b1a-475d-848e-c5a670a0da16

Restart Required: No

Instructions:

For Apollo-managed Foundry instances: The patch has been automatically deployed. No customer action required. For self-managed instances: Contact Palantir support for patching instructions.

🔧 Temporary Workarounds

Restrict Object Explorer Access

all

Temporarily limit or monitor Object Explorer usage for sensitive data until patch is confirmed applied

No specific commands - implement via Foundry access controls

🧯 If You Can't Patch

  • Implement enhanced monitoring of Object Explorer access patterns and user behavior
  • Review and tighten existing access controls for sensitive objects and data

🔍 How to Verify

Check if Vulnerable:

Check with Palantir support or review system logs for unauthorized object access attempts in Object Explorer

Check Version:

Contact Palantir support for version verification as this is a cloud service

Verify Fix Applied:

Confirm with Palantir that your instance has received the automatic patch deployment

📡 Detection & Monitoring

Log Indicators:

  • Unusual Object Explorer access patterns
  • Users accessing object types outside their normal patterns
  • Failed authorization attempts followed by successful object views

Network Indicators:

  • Not applicable - this is an application-layer authorization bypass

SIEM Query:

Search for Object Explorer access logs where user permissions don't match accessed object types or where access patterns deviate from baseline

🔗 References

📤 Share & Export