First published: Wed Nov 02 2022(Updated: )
Pentaho Business Analytics Server versions before 9.2.0.2 and 8.3.0.25 using the Pentaho Analyzer plugin exposes a service endpoint for templates which allows a user-supplied path to access resources that are out of bounds. The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. By using special elements such as ".." and "/" separators, attackers can escape outside of the restricted location to access files or directories that are elsewhere on the system.
Credit: security.vulnerabilities@hitachivantara.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Vantara Pentaho | >=8.3.0.0<8.3.0.25 | |
Hitachi Vantara Pentaho | >=9.2.0.0<9.2.0.2 |
The defect may be mitigated either by uninstalling the Pentaho Analyzer plugin or upgrading to the latest Hitachi Vantara Pentaho version 9.3 release. For versions 9.2 and 8.3 we recommend updating to Service Packs 9.2.0.2/8.3.0.25 or above where this vulnerability is addressed.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-45448.
The severity of CVE-2021-45448 is high.
Pentaho Business Analytics Server versions before 9.2.0.2 and 8.3.0.25 are affected by CVE-2021-45448.
CVE-2021-45448 allows a user to access resources out of bounds by exploiting a service endpoint for templates in the Pentaho Analyzer plugin.
Yes, upgrading to version 9.2.0.2 or 8.3.0.25 of the Pentaho Business Analytics Server will fix CVE-2021-45448.