Overview
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35)
Description
Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API.
Impact
This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Apr 2025 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Overview The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35) Description Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API. Impact This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory. | |
Title | Hitachi Vantara Pentaho Data Integration & Analytics – Path Traversal | |
Weaknesses | CWE-35 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: HITVAN
Published:
Updated: 2025-04-17T13:55:34.359Z
Reserved: 2025-01-27T17:24:54.153Z
Link: CVE-2025-24907

Updated: 2025-04-17T13:41:20.444Z

Status : Awaiting Analysis
Published: 2025-04-16T23:15:45.027
Modified: 2025-04-17T20:21:48.243
Link: CVE-2025-24907

No data.