Pentaho Business Analytics Server versions before 9.2.0.2 and 8.3.0.25 using the Pentaho Analyzer plugin exposes a service endpoint for templates which allows a user-supplied path to access resources that are out of bounds.  The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.  By using special elements such as ".." and "/" separators, attackers can escape outside of the restricted location to access files or directories that are elsewhere on the system.
References
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: HITVAN

Published: 2022-11-02T15:12:25.164Z

Updated:

Reserved: 2021-12-21T05:57:40.703Z


Link: CVE-2021-45448

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2022-11-02T16:15:09.897

Modified: 2023-11-07T03:39:50.680


Link: CVE-2021-45448

JSON object: View

cve-icon Redhat Information

No data.

CWE