FKIE_CVE-2025-0756
Vulnerability from fkie_nvd - Published: 2025-04-16 23:15 - Updated: 2025-04-17 20:21
Severity ?
Summary
Overview
The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99)
Description
Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not restrict JNDI identifiers during the creation of platform data sources.
Impact
An attacker could gain access to or modify sensitive data or system resources. This could allow access to protected files or directories including configuration files and files containing sensitive information, which can lead to remote code execution by unauthorized users.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Overview \n\n\n\n\u00a0\n\n\n\nThe product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99) \n\n\n\n\u00a0\n\n\n\nDescription \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Data Integration \u0026 Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not restrict JNDI identifiers during the creation of platform data sources. \n\n\n\n\u00a0\n\n\n\nImpact \n\n\n\n\u00a0\n\n\n\nAn attacker could gain access to or modify sensitive data or system resources. This could allow access to protected files or directories including configuration files and files containing sensitive information, which can lead to remote code execution by unauthorized users."
},
{
"lang": "es",
"value": "Descripci\u00f3n general, el producto recibe informaci\u00f3n de un componente ascendente, pero no restringe o restringe incorrectamente la informaci\u00f3n antes de que se use como identificador para un recurso que puede estar fuera del \u00e1mbito de control previsto. (CWE-99) Descripci\u00f3n: las versiones de Hitachi Vantara Pentaho Data Integration \u0026amp; Analytics anteriores a la 10.2.0.2, incluidas las 9.3.x y 8.3.x, no restringen los identificadores JNDI durante la creaci\u00f3n de or\u00edgenes de datos de la plataforma. Impacto Un atacante podr\u00eda obtener acceso o modificar datos o recursos del sistema sensibles. Esto podr\u00eda permitir el acceso a archivos o directorios protegidos, incluidos archivos de configuraci\u00f3n y archivos que contienen informaci\u00f3n sensible, lo que puede provocar la ejecuci\u00f3n remota de c\u00f3digo por parte de usuarios no autorizados."
}
],
"id": "CVE-2025-0756",
"lastModified": "2025-04-17T20:21:48.243",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0,
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary"
}
]
},
"published": "2025-04-16T23:15:44.400",
"references": [
{
"source": "security.vulnerabilities@hitachivantara.com",
"url": "https://https://support.pentaho.com/hc/en-us/articles/35771876077709--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Improper-Control-of-Resource-Identifiers-Resource-Injection-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0756"
}
],
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-99"
}
],
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…