Get a grip on your data

With battle-tested solutions and a focus on foundational strength,

Pentaho+ helps you meet the challenges of an AI-driven world.

(Resolved) Hitachi Vantara Pentaho Data Integration & Analytics - Improper Control of Resource Identifiers ('Resource Injection') - Versions before 10.2.0.0 and 9.3.0.9, including 8.3.x Impacted (CVE-2024-5706)

Overview 

The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99)

 

Products Affected 

Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.0 and 9.3.0.9, including 8.3.x

 

Description 

Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not restrict JNDI identifiers during the creation of Community Dashboards, allowing control of system-level data sources.

 

Impact 

An attacker could gain access to or modify sensitive data or system resources. This could allow access to protected files or directories including configuration files and files containing sensitive information, which can lead to remote code execution by unauthorized users.

 

Action  

The defect may be mitigated now by removing the Community Dashboard Framework plugin from the software installation.

We recommend you upgrade to the latest Hitachi Vantara Pentaho 10.2 release where this vulnerability is addressed. For version 9.3, we recommend installing Service Pack 9.3.0.9 or higher where this vulnerability is addressed. 

 

Please review the Pentaho End-of-Life policy to ensure you are up to date.

 


Internal Notes: (Non Customer View-able - Non Confidential)

This issue is logged under JIRA PPP-4881

Comments