Pentaho

Customer Portal

Get a grip on your data

With battle-tested solutions and a focus on foundational strength,

Pentaho+ helps you meet the challenges of an AI-driven world.

(Resolved) Hitachi Vantara Pentaho Data Integration & Analytics - Improper Control of Resource Identifiers ('Resource Injection') - Versions before 9.5.0.1 and 9.3.0.5, including 8.3.x Impacted (CVE-2023-3517)

Overview 

The product receives input from an upstream component, but it does not restrict or incorrectly
restricts the input before it is used as an identifier for a resource that may be outside the intended
sphere of control. (CWE-99)

 

Products Affected 

Hitachi Vantara Pentaho Data Integration & Analytics versions before 9.5.0.1 and 9.3.0.5, including
8.3.x re impacted

 

Description 

Hitachi Vantara Pentaho Data Integration & Analytics versions before 9.5.0.1 and 9.3.0.5, including
8.3.x does not restrict JNDI identifiers during the creation of XActions, allowing control of systemlevel data sources

 

Impact 

An attacker could gain access to or modify sensitive data or system resources. This could allow access
to protected files or directories including configuration files and files containing sensitive
information, which can lead to remote code execution by unauthorized users.

 

Action  

We recommend you upgrade to the latest Hitachi Vantara Pentaho release. For version 9.5 we recommend updating to Service Pack 9.5.0.1 or above and for version 9.3 we recommend updating to Service Packs 9.3.0.5 or above where this vulnerability is addressed. 

Please review the Pentaho End-of-Life policy to ensure you are up to date.

 


Internal Notes: (Non Customer View-able - Non Confidential)

This issue is logged under JIRA PPP-4787

Comments