ID |
CVE-2025-24907
|
Sažetak |
Overview
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35)
Description
Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API.
Impact
This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory. |
Reference |
|
CVSS |
Base: | 6.8 |
Impact: | 4.0 |
Exploitability: | 2.3 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
HIGH |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
NONE |
HIGH |
NONE |
|
CVSS vektor |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N |
Zadnje važnije ažuriranje |
17-04-2025 - 20:21 |
Objavljeno |
16-04-2025 - 23:15 |