Pentaho Business Analytics Server versions before 9.2.0.2 and 8.3.0.25 using the Pentaho Analyzer plugin exposes a service endpoint for templates which allows a user-supplied path to access resources that are out of bounds.  The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.  By using special elements such as ".." and "/" separators, attackers can escape outside of the restricted location to access files or directories that are elsewhere on the system.
History

Fri, 02 May 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HITVAN

Published: 2022-11-02T15:12:25.164Z

Updated: 2025-05-02T15:48:03.329Z

Reserved: 2021-12-21T05:57:40.703Z

Link: CVE-2021-45448

cve-icon Vulnrichment

Updated: 2024-08-04T04:39:21.052Z

cve-icon NVD

Status : Modified

Published: 2022-11-02T16:15:09.897

Modified: 2024-11-21T06:32:13.740

Link: CVE-2021-45448

cve-icon Redhat

No data.