CVE-2022-43940

8.8 HIGH

📋 TL;DR

This vulnerability in Hitachi Vantara Pentaho Business Analytics Server allows unauthorized users to access data source management functions due to improper authorization checks. Attackers could potentially modify, delete, or create data sources, leading to data manipulation or service disruption. Affected versions include all releases before 9.4.0.1 and 9.3.0.2, including the 8.3.x series.

💻 Affected Systems

Products:
  • Hitachi Vantara Pentaho Business Analytics Server
Versions: All versions before 9.4.0.1 and 9.3.0.2, including 8.3.x series
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with data source management service enabled are vulnerable. The vulnerability exists in the authorization mechanism itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative control over data sources, enabling data exfiltration, manipulation of business intelligence reports, or complete service disruption through data source deletion.

🟠

Likely Case

Unauthorized users access and modify data source configurations, potentially exposing sensitive data or disrupting business analytics operations.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to authorized users who might gain elevated privileges within their scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to the Pentaho server and valid user credentials, but authorization checks are bypassed once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.4.0.1 or 9.3.0.2

Vendor Advisory: https://support.pentaho.com/hc/en-us/articles/14456609400973--Resolved-Pentaho-BA-Server-Incorrect-Authorization-Versions-before-9-4-0-1-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-43940-

Restart Required: Yes

Instructions:

1. Download the patched version (9.4.0.1 or 9.3.0.2) from official Pentaho repositories. 2. Backup current installation and configuration. 3. Stop the Pentaho server. 4. Apply the update following vendor upgrade documentation. 5. Restart the server and verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Pentaho server to only trusted IP addresses and users

Disable Data Source Management Service

all

Temporarily disable the vulnerable data source management service if not required

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Pentaho servers
  • Enforce principle of least privilege for all user accounts and monitor for unauthorized data source changes

🔍 How to Verify

Check if Vulnerable:

Check Pentaho server version via admin console or version files. Versions before 9.4.0.1 and 9.3.0.2 (including 8.3.x) are vulnerable.

Check Version:

Check pentaho-server/tomcat/webapps/pentaho/META-INF/maven/pentaho/pentaho-server/pom.xml or admin console version display

Verify Fix Applied:

Verify version is 9.4.0.1 or higher, or 9.3.0.2 or higher. Test authorization controls for data source management functions.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to data source management endpoints
  • Unexpected data source creation/modification/deletion events

Network Indicators:

  • Unusual traffic patterns to /pentaho/api/data-access/data-sources endpoints

SIEM Query:

source="pentaho" AND (event_type="data_source_modified" OR event_type="data_source_created" OR event_type="data_source_deleted") AND user NOT IN authorized_users_list

🔗 References

📤 Share & Export