Pentaho Business Analytics Server versions before 9.2.0.2 and 8.3.0.25 using the Pentaho Analyzer plugin exposes a service endpoint for templates which allows a user-supplied path to access resources that are out of bounds.  The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.  By using special elements such as ".." and "/" separators, attackers can escape outside of the restricted location to access files or directories that are elsewhere on the system.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: HITVAN

Published: 2022-11-02T15:12:25.164Z

Updated: 2024-08-04T04:39:21.052Z

Reserved: 2021-12-21T05:57:40.703Z

Link: CVE-2021-45448

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-11-02T16:15:09.897

Modified: 2024-11-21T06:32:13.740

Link: CVE-2021-45448

cve-icon Redhat

No data.