Skip to main content

CVE-2021-45448: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Hitachi Vantara Pentaho Business Analytics Server

High
VulnerabilityCVE-2021-45448cvecve-2021-45448cwe-22
Published: Wed Nov 02 2022 (11/02/2022, 15:12:25 UTC)
Source: CVE
Vendor/Project: Hitachi Vantara
Product: Pentaho Business Analytics Server

Description

Pentaho Business Analytics Server versions before 9.2.0.2 and 8.3.0.25 using the Pentaho Analyzer plugin exposes a service endpoint for templates which allows a user-supplied path to access resources that are out of bounds.  The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.  By using special elements such as ".." and "/" separators, attackers can escape outside of the restricted location to access files or directories that are elsewhere on the system.

AI-Powered Analysis

AILast updated: 06/25/2025, 23:42:55 UTC

Technical Analysis

CVE-2021-45448 is a path traversal vulnerability identified in Hitachi Vantara's Pentaho Business Analytics Server, specifically affecting versions prior to 9.2.0.2 and 8.3.0.25 that utilize the Pentaho Analyzer plugin. The vulnerability arises because the server exposes a service endpoint for templates that improperly handles user-supplied file path inputs. The software attempts to construct a pathname intended to reference files or directories within a restricted parent directory. However, it fails to adequately sanitize or neutralize special path elements such as ".." (parent directory traversal) and directory separators "/", allowing attackers to manipulate the pathname to escape the restricted directory boundaries. This improper limitation of pathname (CWE-22) enables an attacker to access arbitrary files or directories elsewhere on the underlying system, potentially including sensitive configuration files, credentials, or other critical data. The vulnerability requires low attack complexity (no user interaction needed), but does require the attacker to have some level of privileges (PR:L - privileges required: low). The CVSS v3.1 base score is 7.1 (high severity), reflecting high confidentiality impact, low integrity impact, and no availability impact. No known exploits in the wild have been reported to date. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N). This flaw can lead to unauthorized disclosure of sensitive information, which could be leveraged for further attacks or lateral movement within an affected environment.

Potential Impact

For European organizations using Hitachi Vantara Pentaho Business Analytics Server, this vulnerability poses a significant risk to confidentiality of sensitive business intelligence data and system files. Unauthorized access to files outside the intended directory could expose proprietary analytics data, user credentials, configuration files, or other sensitive information. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), and reputational damage. Since Pentaho is often deployed in enterprise environments for data analytics and reporting, attackers gaining access to internal files could also facilitate further attacks such as privilege escalation or lateral movement within corporate networks. The integrity impact is limited, but the confidentiality breach alone is critical given the nature of data handled by analytics platforms. Availability is not directly impacted, so denial-of-service is unlikely. The requirement for low privileges means that insider threats or compromised low-level accounts could exploit this vulnerability. European organizations in sectors such as finance, manufacturing, telecommunications, and government that rely on Pentaho for analytics are particularly at risk. The lack of known exploits in the wild reduces immediate threat but does not eliminate risk, as attackers may develop exploits given the public disclosure.

Mitigation Recommendations

1. Upgrade Pentaho Business Analytics Server to version 9.2.0.2 or later, or 8.3.0.25 or later, where this vulnerability has been patched. 2. If immediate upgrade is not possible, implement strict network segmentation and access controls to limit access to the Pentaho server endpoints, especially the template service endpoint. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block path traversal patterns such as '..' sequences in URL parameters targeting the template service. 4. Conduct thorough code reviews and input validation on any custom plugins or extensions interacting with file paths to ensure proper sanitization and canonicalization of user inputs. 5. Monitor logs for suspicious access patterns or attempts to access unauthorized file paths. 6. Enforce the principle of least privilege on user accounts accessing the Pentaho server to minimize the risk of exploitation by low-privilege users. 7. Regularly audit and restrict file system permissions on the server to limit the impact of any unauthorized file access. 8. Educate administrators and security teams on this vulnerability to ensure timely patching and monitoring.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
HITVAN
Date Reserved
2021-12-21T05:57:40.703Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbebf38

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/25/2025, 11:42:55 PM

Last updated: 8/15/2025, 5:38:49 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats