Critical Flaws Uncovered in Pentaho Business Analytics Software

Cyber Security

Products You May Like

Multiple vulnerabilities have been disclosed in Hitachi Vantara’s Pentaho Business Analytics software that could be abused by malicious actors to upload arbitrary data files and even execute arbitrary code on the underlying host system of the application.

The security weaknesses were reported by researchers Alberto Favero from German cybersecurity firm Hawsec and Altion Malka from Census Labs earlier this year, prompting the company to issue necessary patches to address the issues.

Automatic GitHub Backups

Pentaho is a Java-based business intelligence platform that offers data integration, analytics, online analytical processing (OLAP), and mining capabilities, and counts major companies and organizations like Bell, CERN, Cipal, Logitech, Nasdaq, Telefonica, Teradata, and the National September 11 Memorial and Museum among its customers.

Pentaho Business Analytics Software

The list of flaws, which affect Pentaho Business Analytics versions 9.1 and lower, is as follows –

  • CVE-2021-31599 (CVSS score: 9.9) – Remote Code Execution through Pentaho Report Bundles
  • CVE-2021-31600 (CVSS score: 4.3) – Jackrabbit User Enumeration
  • CVE-2021-31601 (CVSS score: 7.1) – Insufficient Access Control of Data Source Management
  • CVE-2021-31602 (CVSS score: 5.3) – Authentication Bypass of Spring APIs
  • CVE-2021-34684 (CVSS score: 9.8) – Unauthenticated SQL Injection
  • CVE-2021-34685 (CVSS score: 2.7) – Bypass of Filename Extension Restrictions

Successful exploitation of the flaws could allow authenticated users with sufficient role permissions to upload and run Pentaho Report Bundles to run malicious code on the host server and exfiltrate sensitive application data, and circumvent filename extension restrictions enforced by the application and upload files of any type.

What’s more, they could also be leveraged by a low-privilege authenticated attacker to retrieve credentials and connection details of all Pentaho data sources, permitting the party to harvest and transmit data, in addition to enabling an unauthenticated user to execute arbitrary SQL queries on the backend database and retrieve data.

In light of the critical nature of the flaws and the risk they pose to the underlying system, users of the application are highly recommended to update to the latest version.

Products You May Like

Articles You May Like

Google cancels plans to kill off cookies for advertisers
Vietnamese Hackers Using ‘Maorrisbot’ to Target Indians in WhatsApp e-Challan Scam: CloudSEK
Navigating Insider Risks: Are your Employees Enabling External Threats?
Amazon Prime Day 2024 Sale: Top Deals on Laptops Under Rs. 50,000 During the Sale
Amazon Prime Day 2024 Sale: Best Deals on Tablets From Apple, Samsung, OnePlus, and More

Leave a Reply

Your email address will not be published. Required fields are marked *