{"vulnerability": "cve-2025-24907", "sightings": [{"uuid": "822ee4e8-e379-4415-b18b-6598095e156d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24907", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lmy3rxpwl22l", "content": "", "creation_timestamp": "2025-04-17T02:48:34.575452Z"}, {"uuid": "f6e0d1e1-a2cf-4b27-9921-cc5578d5aeb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24907", "type": "seen", "source": "https://t.me/cvedetector/23187", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-24907 - Hitachi Vantara Pentaho Data Integration &amp; Analytics Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-24907 \nPublished : April 16, 2025, 11:15 p.m. | 39\u00a0minutes ago \nDescription : Overview   \n  \n  \n  \n\u00a0  \n  \n  \n  \nThe product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35)   \n  \n  \n  \n\u00a0  \n  \n  \n  \nDescription   \n  \n  \n  \n\u00a0  \n  \n  \n  \nHitachi Vantara Pentaho Data Integration &amp; Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API.   \n  \n  \n  \n\u00a0  \n  \n  \n  \nImpact   \n  \n  \n  \n\u00a0  \n  \n  \n  \nThis allows attackers to traverse the file system to access files or directories that are outside of the restricted directory. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-17T02:06:22.000000Z"}, {"uuid": "17ec6a65-d149-4c00-b745-5db997f72892", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-24907", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/12158", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-24907\n\ud83d\udd25 CVSS Score: 6.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N)\n\ud83d\udd39 Description: Overview \n\n\n\n\u00a0\n\n\n\nThe product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration &amp; Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nThis allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.\n\ud83d\udccf Published: 2025-04-16T22:39:15.660Z\n\ud83d\udccf Modified: 2025-04-16T22:39:15.660Z\n\ud83d\udd17 References:\n1. https://support.pentaho.com/hc/en-us/articles/35781624069005--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Path-Traversal-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-24907", "creation_timestamp": "2025-04-16T22:57:36.000000Z"}]}