Pentaho

Customer Portal

Get a grip on your data

With battle-tested solutions and a focus on foundational strength,

Pentaho+ helps you meet the challenges of an AI-driven world.

(Resolved) Pentaho BA Server - Deserialization of Untrusted Data - Versions before 9.4.0.1 and 9.3.0.3, including 8.3.x Impacted (CVE-2022-4815)

Overview 

Hitachi Vantara Pentaho Business Analytics Server - deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502)

 

Products Affected 

Hitachi Vantara Pentaho Business Analytics Server versions before 9.4.0.1 and 9.3.0.3, including 8.3.x are impacted.

 

Description 

Hitachi Vantara Pentaho Business Analytics Server versions before 9.4.0.1 and 9.3.0.3, including 8.3.x deserialize untrusted JSON data without constraining the parser to approved classes and methods. 

 

Impact 

When developers place no restrictions on "gadget chains," or series of instances and method invocations that can self-execute during the deserialization process (i.e., before the object is returned to the caller), it is sometimes possible for attackers to leverage them to perform unauthorized actions. 

 

Action  

We recommend you upgrade to the latest Hitachi Vantara Pentaho version 9.4 release with Service Pack 9.4.0.1. For version 9.3 we recommend updating to Service Packs 9.3.0.3 or above where this vulnerability is addressed. 

Please review the Pentaho End-of-Life policy to ensure you are up to date.

 


Internal Notes: (Non Customer View-able - Non Confidential)

This issue is logged under JIRA PPP-4801

Comments