The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502)   Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.   When developers place no restrictions on "gadget chains," or series of instances and method invocations that can self-execute during the deserialization process (i.e., before the object is returned to the caller), it is sometimes possible for attackers to leverage them to perform unauthorized actions.
History

Thu, 20 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 20 Feb 2025 15:45:00 +0000


Thu, 20 Feb 2025 15:15:00 +0000


Wed, 19 Feb 2025 23:45:00 +0000

Type Values Removed Values Added
Description The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502)   Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.   When developers place no restrictions on "gadget chains," or series of instances and method invocations that can self-execute during the deserialization process (i.e., before the object is returned to the caller), it is sometimes possible for attackers to leverage them to perform unauthorized actions.
Title Hitachi Vantara Pentaho Business Analytics Server - Deserialization of Untrusted Data
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HITVAN

Published:

Updated: 2025-02-20T17:21:31.689Z

Reserved: 2024-06-06T15:36:41.050Z

Link: CVE-2024-37361

cve-icon Vulnrichment

Updated: 2025-02-20T17:21:24.294Z

cve-icon NVD

Status : Received

Published: 2025-02-20T00:15:19.507

Modified: 2025-02-20T15:15:13.190

Link: CVE-2024-37361

cve-icon Redhat

No data.