CVE-2024-28981

8.5 HIGH

📋 TL;DR

This vulnerability in Hitachi Vantara Pentaho Data Integration & Analytics exposes database passwords when users search metadata injectable fields. Attackers can retrieve sensitive credentials without authentication, potentially compromising database systems. Organizations using affected Pentaho versions before 10.1.0.0 or 9.3.0.8, including 8.3.x, are at risk.

💻 Affected Systems

Products:
  • Hitachi Vantara Pentaho Data Integration & Analytics
Versions: Versions before 10.1.0.0 and 9.3.0.8, including all 8.3.x versions
Operating Systems: All supported operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with metadata injectable fields are vulnerable; no special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain database credentials, leading to full database compromise, data exfiltration, ransomware deployment, or lateral movement to other systems.

🟠

Likely Case

Unauthorized access to database credentials results in data theft, unauthorized data modification, or privilege escalation within the database environment.

🟢

If Mitigated

With proper network segmentation and credential rotation, impact is limited to credential exposure requiring immediate rotation and investigation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to the search functionality but no authentication, making it straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.1.0.0 or 9.3.0.8

Vendor Advisory: https://support.pentaho.com/hc/en-us/articles/27569056997261--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Insufficiently-Protected-Credentials-Versions-before-10-1-0-0-including-9-3-x-and-8-3-x-impacted-CVE-2024-28981

Restart Required: Yes

Instructions:

1. Download the patched version (10.1.0.0 or 9.3.0.8) from Hitachi Vantara. 2. Backup current configuration and data. 3. Stop Pentaho services. 4. Install the update following vendor documentation. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Disable Metadata Injectable Fields

all

Temporarily disable or restrict access to metadata injectable field search functionality to prevent credential exposure.

Network Access Control

all

Restrict network access to Pentaho instances using firewalls or network segmentation to limit exposure.

🧯 If You Can't Patch

  • Immediately rotate all database credentials used by Pentaho applications
  • Implement strict network segmentation and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Pentaho version via admin console or configuration files; versions before 10.1.0.0 or 9.3.0.8 (including 8.3.x) are vulnerable.

Check Version:

Check pentaho.version in configuration files or use admin console system information

Verify Fix Applied:

Confirm version is 10.1.0.0 or 9.3.0.8+ via admin interface and test that metadata search no longer exposes credentials.

📡 Detection & Monitoring

Log Indicators:

  • Unusual metadata search patterns
  • Failed authentication attempts from new IPs
  • Database connection errors

Network Indicators:

  • Unexpected traffic to Pentaho search endpoints
  • Outbound connections from Pentaho to databases from unusual sources

SIEM Query:

source="pentaho" AND (event="metadata_search" OR event="credential_access")

🔗 References

📤 Share & Export