First published: Wed Feb 19 2025(Updated: )
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502) Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods. When developers place no restrictions on "gadget chains," or series of instances and method invocations that can self-execute during the deserialization process (i.e., before the object is returned to the caller), it is sometimes possible for attackers to leverage them to perform unauthorized actions.
Credit: security.vulnerabilities@hitachivantara.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Vantara Pentaho Business Analytics Server | <10.2.0.0<=9.3.0.9>=8.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37361 is classified as a medium severity vulnerability due to improper deserialization of untrusted data.
To mitigate CVE-2024-37361, upgrade to Hitachi Vantara Pentaho Business Analytics Server version 10.2.0.0, 9.3.0.9, or later.
CVE-2024-37361 affects Hitachi Vantara Pentaho Business Analytics Server versions prior to 10.2.0.0 and 9.3.0.9, including 8.3.x.
The nature of CVE-2024-37361 is that it involves deserialization of untrusted JSON data without proper validation.
Yes, a patch is available through upgrades to the specified secure versions of Hitachi Vantara Pentaho Business Analytics Server.