Overview
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35)
Description
Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API.
Impact
This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
References
Configurations
No configuration.
History
16 Apr 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-16 23:15
Updated : 2025-04-17 20:21
NVD link : CVE-2025-24907
Mitre link : CVE-2025-24907
CVE.ORG link : CVE-2025-24907
JSON object : View
Products Affected
No product.
CWE
CWE-35
Path Traversal: '.../...//'