The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502)
Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.
When developers place no restrictions on "gadget chains," or series of instances and method invocations that can self-execute during the deserialization process (i.e., before the object is returned to the caller), it is sometimes possible for attackers to leverage them to perform unauthorized actions.
Metrics
Affected Vendors & Products
References
History
Thu, 20 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Feb 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 20 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 19 Feb 2025 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502) Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods. When developers place no restrictions on "gadget chains," or series of instances and method invocations that can self-execute during the deserialization process (i.e., before the object is returned to the caller), it is sometimes possible for attackers to leverage them to perform unauthorized actions. | |
Title | Hitachi Vantara Pentaho Business Analytics Server - Deserialization of Untrusted Data | |
Weaknesses | CWE-502 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: HITVAN
Published:
Updated: 2025-02-20T17:21:31.689Z
Reserved: 2024-06-06T15:36:41.050Z
Link: CVE-2024-37361

Updated: 2025-02-20T17:21:24.294Z

Status : Received
Published: 2025-02-20T00:15:19.507
Modified: 2025-02-20T15:15:13.190
Link: CVE-2024-37361

No data.