Hitachi Vantara Pentaho Business Analytics Server - uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. (CWE-22)
Hitachi Vantara Pentaho Business Analytics Server versions before 184.108.40.206 and 220.127.116.11, including 8.3.x are impacted.
Hitachi Vantara Pentaho Business Analytics Server versions before 18.104.22.168 and 22.214.171.124, including 8.3.x, using the Pentaho Data Access plugin exposes a service endpoint for CSV import which allows a user supplied path to access resources that are out of bounds.
Many file operations are intended to take place within a restricted directory. By using special elements such as ".." and "/" separators, attackers can escape outside of the restricted location to access files or directories that are elsewhere on the system.
We recommend you upgrade to the latest Hitachi Vantara Pentaho version 9.4 release. For version 9.3 we recommend updating to Service Packs 126.96.36.199 or above where this vulnerability is addressed.
Please review the Pentaho End-of-Life policy to ensure you are up to date.
This issue is logged under JIRA PPP-4762