Home

Description

Glutton V1 service endpoints were exposed without any authentication on Gotham stacks, this could have allowed users that did not have any permission to hit glutton backend directly and read/update/delete data. The affected service has been patched and automatically deployed to all Apollo-managed Gotham Instances

PUBLISHED Reserved 2024-10-16 | Published 2025-12-19 | Updated 2025-12-20 | Assigner Palantir




CRITICAL: 9.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Problem types

The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.

Product status

105.95.0 (semver) before *
unaffected

References

palantir.safebase.us/...95e2d805-dd2f-4544-b164-e61100f47b11

cve.org (CVE-2024-49587)

nvd.nist.gov (CVE-2024-49587)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.