CVE-2021-31601

7.1 HIGH

📋 TL;DR

This vulnerability allows any authenticated user in Hitachi Vantara Pentaho systems to retrieve database connection details and credentials via SOAP web services, regardless of their privilege level. It affects Pentaho through version 9.1 and Pentaho Business Intelligence Server through version 7.x. This exposes sensitive database credentials to unauthorized users.

💻 Affected Systems

Products:
  • Hitachi Vantara Pentaho
  • Pentaho Business Intelligence Server
Versions: Pentaho through 9.1, Pentaho Business Intelligence Server through 7.x
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access but no special privileges. Affects all default installations with SOAP web services enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full access to backend databases, leading to data exfiltration, data manipulation, or lateral movement to other systems using stolen credentials.

🟠

Likely Case

Malicious insiders or compromised accounts extract database credentials, potentially accessing sensitive business data or using credentials for further attacks.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to credential exposure without direct database access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via SOAP requests. Public exploit details available in Packet Storm references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Hitachi security advisories for specific patched versions

Vendor Advisory: https://www.hitachi.com/hirt/security/index.html

Restart Required: Yes

Instructions:

1. Check Hitachi security advisory for specific patch versions. 2. Apply vendor-provided patches or upgrade to fixed versions. 3. Restart Pentaho services after patching. 4. Verify SOAP web service access controls are properly enforced.

🔧 Temporary Workarounds

Disable SOAP Web Services

all

Disable SOAP web service endpoints if not required for business operations

Modify Pentaho configuration files to disable SOAP endpoints
Consult Pentaho documentation for specific configuration changes

Network Access Control

all

Restrict access to Pentaho SOAP endpoints using firewall rules or network segmentation

Configure firewall to allow only trusted IPs to access Pentaho SOAP ports
Implement network segmentation to isolate Pentaho servers

🧯 If You Can't Patch

  • Implement strict access controls and monitor all authenticated user activity on Pentaho systems
  • Rotate all database credentials exposed through Pentaho and monitor for unauthorized database access

🔍 How to Verify

Check if Vulnerable:

Test if authenticated users can access SOAP endpoints that list database connections. Use tools like SOAPUI with valid credentials to query Pentaho web services.

Check Version:

Check Pentaho version through web interface or configuration files. For Linux: cat /pentaho/server/pentaho-server/version.txt

Verify Fix Applied:

After patching, verify that authenticated users without proper privileges cannot retrieve database connection details via SOAP requests.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SOAP requests to database connection endpoints
  • Multiple failed authentication attempts followed by successful SOAP requests
  • User accounts accessing SOAP services they don't normally use

Network Indicators:

  • SOAP traffic to Pentaho servers from unexpected sources
  • Patterns of SOAP requests to database-related endpoints

SIEM Query:

source="pentaho" AND (uri="*soap*" OR method="POST") AND (uri="*database*" OR uri="*connection*")

🔗 References

📤 Share & Export