The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Hitachi Vantara Pentaho Business Analytics Server versions before 188.8.131.52, 184.108.40.206 and 220.127.116.11 impacted.
Hitachi Vantara Pentaho Business Analytics Server versions before 18.104.22.168, 22.214.171.124 and 126.96.36.199 using the Pentaho Analyzer plugin exposes a service endpoint for templates which allows a user supplied path to access resources that are out of bounds.
Many file operations are intended to take place within a restricted directory. By using special elements such as ".." and "/" separators, attackers can escape outside of the restricted location to access files or directories that are elsewhere on the system.
We recommend you upgrade to the latest Hitachi Vantara Pentaho version 9.3 release. For version 9.2 and 8.3 we recommend updating to Service Packs 188.8.131.52/184.108.40.206 or above where this vulnerability is addressed.
For versions prior to the above, The defect may be mitigated by uninstalling the Pentaho Analyzer plugin. Please review the Pentaho End-of-Life policy to ensure you are up to date.
This issue is logged under JIRA PPP-4383