CVE-2023-3517

8.5 HIGH

📋 TL;DR

This vulnerability in Hitachi Vantara Pentaho Data Integration & Analytics allows attackers to control system-level data sources by exploiting unrestricted JNDI identifiers during XAction creation. It affects all versions before 9.5.0.1 and 9.3.0.5, including 8.3.x. Organizations using vulnerable Pentaho deployments are at risk of data manipulation and unauthorized access.

💻 Affected Systems

Products:
  • Hitachi Vantara Pentaho Data Integration & Analytics
Versions: All versions before 9.5.0.1 and 9.3.0.5, including 8.3.x
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with XAction functionality enabled, which is typically active by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data exfiltration, data corruption, and potential lateral movement to connected systems.

🟠

Likely Case

Unauthorized access to sensitive data sources, data manipulation, and potential privilege escalation within the Pentaho environment.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only affecting isolated Pentaho components.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to create XActions, but the vulnerability is in a core component with high impact potential.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.5.0.1 or 9.3.0.5

Vendor Advisory: https://support.pentaho.com/hc/en-us/articles/19668665099533

Restart Required: Yes

Instructions:

1. Backup your Pentaho environment. 2. Download the appropriate patch version (9.5.0.1 for 9.5.x, 9.3.0.5 for 9.3.x). 3. Follow the official Pentaho upgrade documentation. 4. Restart all Pentaho services. 5. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Restrict XAction Creation

all

Limit user permissions to prevent unauthorized creation of XActions.

Configure Pentaho security settings to restrict XAction creation to trusted administrators only.

Network Segmentation

all

Isolate Pentaho servers from critical data sources and other sensitive systems.

Implement firewall rules to restrict Pentaho server network access to only necessary endpoints.

🧯 If You Can't Patch

  • Implement strict access controls and monitor all XAction creation activities.
  • Isolate Pentaho servers in a DMZ with limited network connectivity to critical systems.

🔍 How to Verify

Check if Vulnerable:

Check your Pentaho version via the web interface (Help → About) or server logs. If version is below 9.5.0.1 (for 9.5.x) or 9.3.0.5 (for 9.3.x), you are vulnerable.

Check Version:

Check Pentaho web interface: Help → About, or examine server startup logs for version information.

Verify Fix Applied:

After patching, verify the version shows 9.5.0.1 or higher (for 9.5.x) or 9.3.0.5 or higher (for 9.3.x). Test XAction creation with JNDI identifiers to ensure restrictions are in place.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XAction creation events
  • JNDI-related errors or unusual data source connections
  • Authentication logs showing suspicious user activity

Network Indicators:

  • Unexpected outbound connections from Pentaho servers to external systems
  • Unusual data transfer patterns from data sources

SIEM Query:

source="pentaho" AND (event="XAction creation" OR event="JNDI" OR event="data source connection")

🔗 References

📤 Share & Export