Pentaho Business Analytics
Server versions before 9.2.0.2 and 8.3.0.25 using the Pentaho
Analyzer plugin exposes a service endpoint for templates which allows a
user-supplied path to access resources that are out of bounds. 

The software uses external input to construct a pathname that is intended to identify a file or
directory that is located underneath a restricted parent directory, but the software does not
properly neutralize special elements within the pathname that can cause the pathname to
resolve to a location that is outside of the restricted directory.  By using special elements such as
".." and "/" separators, attackers can escape outside of the restricted
location to access files or directories that are elsewhere on the
system.



Advisories
Source ID Title
EUVD EUVD EUVD-2021-32219 Pentaho Business Analytics Server versions before 9.2.0.2 and 8.3.0.25 using the Pentaho Analyzer plugin exposes a service endpoint for templates which allows a user-supplied path to access resources that are out of bounds.  The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.  By using special elements such as ".." and "/" separators, attackers can escape outside of the restricted location to access files or directories that are elsewhere on the system.
Fixes

Solution

The defect may be mitigated either by uninstalling the Pentaho Analyzer plugin or upgrading to the latest Hitachi Vantara Pentaho version 9.3 release. For versions 9.2 and 8.3 we recommend updating to Service Packs 9.2.0.2/8.3.0.25 or above where this vulnerability is addressed.


Workaround

No workaround given by the vendor.

History

Fri, 02 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HITVAN

Published:

Updated: 2025-05-02T15:48:03.329Z

Reserved: 2021-12-21T05:57:40.703Z

Link: CVE-2021-45448

cve-icon Vulnrichment

Updated: 2024-08-04T04:39:21.052Z

cve-icon NVD

Status : Modified

Published: 2022-11-02T16:15:09.897

Modified: 2024-11-21T06:32:13.740

Link: CVE-2021-45448

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.