Overview
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Products Affected
Hitachi Vantara Pentaho Business Analytics Server versions before 9.3.0.0, 9.2.0.2 and 8.3.0.25 impacted.
Description
Hitachi Vantara Pentaho Business Analytics Server versions before 9.3.0.0, 9.2.0.2 and 8.3.0.25 using the Pentaho Analyzer plugin exposes a service endpoint for templates which allows a user supplied path to access resources that are out of bounds.
Impact
Many file operations are intended to take place within a restricted directory. By using special elements such as ".." and "/" separators, attackers can escape outside of the restricted location to access files or directories that are elsewhere on the system.
Action
We recommend you upgrade to the latest Hitachi Vantara Pentaho version 9.3 release. For version 9.2 and 8.3 we recommend updating to Service Packs 9.2.0.2/8.3.0.25 or above where this vulnerability is addressed.
For versions prior to the above, The defect may be mitigated by uninstalling the Pentaho Analyzer plugin. Please review the Pentaho End-of-Life policy to ensure you are up to date.
Comments