Deserialization Vulnerability in Hitachi Vantara Pentaho Business Analytics Server
CVE-2024-37361

9.9CRITICAL

Key Information:

What is CVE-2024-37361?

CVE-2024-37361 is a security vulnerability found in the Hitachi Vantara Pentaho Business Analytics Server, crucial software used for business intelligence and data analytics. The vulnerability arises from the server's improper handling of deserialization processes, specifically its failure to validate untrusted JSON data. This oversight can lead to unauthorized actions being executed within the application, potentially exposing an organization to significant operational and security risks.

Technical Details

The vulnerability specifically affects versions of the Hitachi Vantara Pentaho Business Analytics Server prior to 10.2.0.0 and 9.3.0.9, including 8.3.x. The issue occurs because the deserialization process lacks constraints on the classes and methods that can be instantiated. As a result, attackers might exploit the deserialization of untrusted data by crafting "gadget chains"—a sequence of method invocations that exploit this weakness to execute arbitrary code or commands before the object is returned to the application.

Potential Impact of CVE-2024-37361

  1. Unauthorized Access: The vulnerability allows attackers to perform unauthorized actions within the application, potentially compromising sensitive business data and intelligence processes.

  2. Data Integrity Risk: Exploitation of this vulnerability could enable attackers to manipulate or corrupt data, leading to incorrect business analytics outcomes and potentially harming business decisions based on faulty data.

  3. Operational Disruption: By leveraging the vulnerability, attackers could disrupt business operations, leading to downtime and financial losses, in addition to the resources required for remediation and recovery efforts.

Affected Version(s)

Pentaho Business Analytics Server 1.0 < 9.3.0.9

Pentaho Data Integration & Analytics 10.0 < 10.2.0.0

References

CVSS V3.1

Score:
9.9
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

.