CVE-2024-37359

8.6 HIGH

📋 TL;DR

This is a Server-Side Request Forgery (SSRF) vulnerability in Hitachi Vantara Pentaho Business Analytics Server where the server doesn't validate the Host header in HTTP/HTTPS requests. Attackers can make the server send requests to unexpected destinations, potentially bypassing firewalls and accessing internal resources. Affected are Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x.

💻 Affected Systems

Products:
  • Hitachi Vantara Pentaho Business Analytics Server
Versions: Versions before 10.2.0.0 and 9.3.0.9, including all 8.3.x versions
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable; no special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers use the server as a proxy to scan internal networks, access internal systems via file:// protocol, or exploit other protocols like gopher:// to gain control over request contents and potentially access sensitive data or systems.

🟠

Likely Case

Attackers bypass firewall restrictions to access internal web services, conduct port scanning of internal networks, or retrieve internal files using file:// URLs.

🟢

If Mitigated

With proper network segmentation and egress filtering, impact is limited to the server's network segment and authorized destinations only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires sending crafted HTTP requests but doesn't require authentication. Attackers need network access to the vulnerable server.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.2.0.0 or 9.3.0.9

Vendor Advisory: https://support.pentaho.com/hc/en-us/articles/34296789835917--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Server-Side-Request-Forgery-Versions-before-10-2-0-0-and-9-3-0-9-including-8-3-x-Impacted-CVE-2024-37359

Restart Required: No

Instructions:

1. Download the patched version (10.2.0.0 or 9.3.0.9) from official Hitachi Vantara sources. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Network Egress Filtering

all

Configure firewall rules to restrict outbound connections from the Pentaho server to only authorized destinations and protocols.

Reverse Proxy Validation

all

Deploy a reverse proxy that validates and sanitizes Host headers before forwarding requests to the Pentaho server.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Pentaho server from sensitive internal networks
  • Deploy web application firewall (WAF) rules to detect and block SSRF patterns in HTTP requests

🔍 How to Verify

Check if Vulnerable:

Check the server version via the web interface or configuration files. If version is below 10.2.0.0 or 9.3.0.9 (including 8.3.x), the system is vulnerable.

Check Version:

Check the Pentaho server version via the web interface at /pentaho/Home or examine server configuration files for version information.

Verify Fix Applied:

After patching, test with controlled SSRF payloads to ensure the server no longer processes requests with manipulated Host headers to unauthorized destinations.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound connections from the Pentaho server
  • HTTP requests with file://, gopher://, or tftp:// URLs in logs
  • Requests to internal IP addresses from the Pentaho server

Network Indicators:

  • Pentaho server making unexpected outbound connections to internal systems
  • Traffic to unusual ports or protocols from the Pentaho server

SIEM Query:

source="pentaho_server" AND (url="file://*" OR url="gopher://*" OR url="tftp://*") OR (destination_ip IN internal_ranges AND source="pentaho_server")

🔗 References

📤 Share & Export