First published: Wed Apr 16 2025(Updated: )
Overview The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35) Description Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the UploadFile service. Impact This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Credit: security.vulnerabilities@hitachivantara.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Vantara Pentaho | <10.2.0.2>=9.3.0<9.3.x>=8.3.0<8.3.x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-24908 is classified as high due to the potential for unauthorized file access.
To fix CVE-2025-24908, update the Pentaho Data Integration & Analytics software to version 10.2.0.2 or later.
CVE-2025-24908 describes a path traversal vulnerability that allows manipulation of path names to access restricted directories.
Versions of Pentaho Data Integration & Analytics prior to 10.2.0.2, including versions 9.3.x and 8.3.x, are affected by CVE-2025-24908.
CVE-2025-24908 could allow an attacker to access sensitive files outside of the intended directory, leading to potential data breaches.