7.1

CVE-2021-45448

Pentaho Business Analytics
 Server versions before 9.2.0.2 and 8.3.0.25 using the Pentaho 
Analyzer plugin exposes a service endpoint for templates which allows a 
user-supplied path to access resources that are out of bounds. 

The software uses external input to construct a pathname that is intended to identify a file or 
directory that is located underneath a restricted parent directory, but the software does not 
properly neutralize special elements within the pathname that can cause the pathname to 
resolve to a location that is outside of the restricted directory.  By using special elements such as 
".." and "/" separators, attackers can escape outside of the restricted 
location to access files or directories that are elsewhere on the 
system.



Daten sind bereitgestellt durch National Vulnerability Database (NVD)
HitachiVantara Pentaho Version >= 8.3.0.0 < 8.3.0.25
HitachiVantara Pentaho Version >= 9.2.0.0 < 9.2.0.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.34% 0.563
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.5 2.8 3.6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
security.vulnerabilities@hitachivantara.com 7.1 2.8 4.2
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.