{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-45448","assignerOrgId":"dce6e192-ff49-4263-9134-f0beccb9bc13","state":"PUBLISHED","assignerShortName":"HITVAN","requesterUserId":"520cc88b-a1c8-44f6-9154-21a4d74c769f","dateReserved":"2021-12-21T05:57:40.703Z","datePublished":"2022-11-02T15:12:25.164Z","dateUpdated":"2025-05-02T15:48:03.329Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["Pentaho Analyzer plugin"],"product":"Pentaho Business Analytics Server","vendor":"Hitachi Vantara","versions":[{"lessThan":"9.2.0.2","status":"affected","version":"9.2","versionType":"ALL"},{"lessThan":"8.3.0.25","status":"affected","version":"1.0","versionType":"All"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n<p>Pentaho Business Analytics\n Server versions before 9.2.0.2 and 8.3.0.25 using the Pentaho \nAnalyzer plugin exposes a service endpoint for templates which allows a \nuser-supplied path to access resources that are out of bounds.&nbsp;\n\nThe software uses external input to construct a pathname that is intended to identify a file or \ndirectory that is located underneath a restricted parent directory, but the software does not \nproperly neutralize special elements within the pathname that can cause the pathname to \nresolve to a location that is outside of the restricted directory. <span style=\"background-color: var(--wht);\">&nbsp;By using special elements such as \n\"..\" and \"/\" separators, attackers can escape outside of the restricted \nlocation to access files or directories that are elsewhere on the \nsystem.</span></p>\n\n"}],"value":"Pentaho Business Analytics\n Server versions before 9.2.0.2 and 8.3.0.25 using the Pentaho \nAnalyzer plugin exposes a service endpoint for templates which allows a \nuser-supplied path to access resources that are out of bounds. \n\nThe software uses external input to construct a pathname that is intended to identify a file or \ndirectory that is located underneath a restricted parent directory, but the software does not \nproperly neutralize special elements within the pathname that can cause the pathname to \nresolve to a location that is outside of the restricted directory.  By using special elements such as \n\"..\" and \"/\" separators, attackers can escape outside of the restricted \nlocation to access files or directories that are elsewhere on the \nsystem.\n\n\n\n"}],"impacts":[{"descriptions":[{"lang":"en","value":"Many file operations are intended to take place within a restricted directory. By using special  elements such as \"..\" and \"/\" separators, attackers can escape outside of the restricted  location to access files or directories that are elsewhere on the system"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"dce6e192-ff49-4263-9134-f0beccb9bc13","shortName":"HITVAN","dateUpdated":"2022-11-02T15:12:25.164Z"},"references":[{"url":"https://support.pentaho.com/hc/en-us/articles/6744743458701"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n\nThe defect may be mitigated either by uninstalling the Pentaho Analyzer plugin or upgrading&nbsp;to the latest Hitachi Vantara Pentaho version \n9.3 release. For versions 9.2 and 8.3 we recommend updating to Service \nPacks 9.2.0.2/8.3.0.25 or above where this vulnerability is addressed. \n\n<br>"}],"value":"\n\nThe defect may be mitigated either by uninstalling the Pentaho Analyzer plugin or upgrading to the latest Hitachi Vantara Pentaho version \n9.3 release. For versions 9.2 and 8.3 we recommend updating to Service \nPacks 9.2.0.2/8.3.0.25 or above where this vulnerability is addressed. \n\n\n"}],"source":{"discovery":"UNKNOWN"},"title":"Pentaho Business Analytics Server - Pentaho Analyzer plugin exposes a service endpoint for templates which  allows a user supplied path to access resources that are out of bounds.","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T04:39:21.052Z"},"title":"CVE Program Container","references":[{"url":"https://support.pentaho.com/hc/en-us/articles/6744743458701","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-02T15:47:51.519451Z","id":"CVE-2021-45448","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-02T15:48:03.329Z"}}]}}