CVE-2025-24907

Overview   The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35)   Description   Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API.   Impact   This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Configurations

No configuration.

History

16 Apr 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-16 23:15

Updated : 2025-04-17 20:21


NVD link : CVE-2025-24907

Mitre link : CVE-2025-24907

CVE.ORG link : CVE-2025-24907


JSON object : View

Products Affected

No product.

CWE
CWE-35

Path Traversal: '.../...//'