CVE-2024-37360

4.4 MEDIUM

📋 TL;DR

This Cross-Site Scripting (XSS) vulnerability in Hitachi Vantara Pentaho Business Analytics Server allows attackers to inject malicious scripts into the Analyzer plugin interface via specially crafted URLs. When exploited, attackers can steal session cookies, perform actions on behalf of authenticated users, and potentially compromise administrator accounts. Organizations running affected Pentaho versions are vulnerable.

💻 Affected Systems

Products:
  • Hitachi Vantara Pentaho Business Analytics Server
Versions: All versions prior to 10.2.0.0 and 9.3.0.9, including 8.3.x
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the Analyzer plugin interface specifically

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account takeover leading to complete system compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Session hijacking of authenticated users, credential theft, and unauthorized actions performed on behalf of victims.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires user interaction (clicking malicious link) but exploitation is straightforward once the vector is known

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.2.0.0 or 9.3.0.9

Vendor Advisory: https://support.pentaho.com/hc/en-us/articles/34298351866893--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-CVE-2024-37360

Restart Required: Yes

Instructions:

1. Download the patched version (10.2.0.0 or 9.3.0.9) from official Pentaho sources. 2. Backup current installation and data. 3. Stop the Pentaho server. 4. Apply the update following vendor documentation. 5. Restart the server and verify functionality.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources and prevent inline script execution

Add 'Content-Security-Policy' header to web server configuration with appropriate directives

Input Validation Filter

all

Implement web application firewall or reverse proxy rules to filter malicious script patterns

Configure WAF rules to block requests containing script tags and common XSS payloads

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers to prevent script execution from unauthorized sources
  • Deploy web application firewall with XSS protection rules and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check Pentaho server version against affected versions list. Test Analyzer plugin interface for XSS vulnerabilities using security testing tools.

Check Version:

Check Pentaho console or administration interface for version information, or examine server startup logs

Verify Fix Applied:

Verify version is 10.2.0.0 or higher, or 9.3.0.9 or higher. Perform XSS testing against Analyzer interface to confirm vulnerability is patched.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns containing script tags or JavaScript in Analyzer plugin requests
  • Multiple failed authentication attempts following suspicious URL access

Network Indicators:

  • HTTP requests containing script injection patterns to Pentaho Analyzer endpoints
  • Outbound connections to suspicious domains following Pentaho access

SIEM Query:

source="pentaho" AND (url="*analyzer*" AND (url="*<script*" OR url="*javascript:*" OR url="*onload=*"))

🔗 References

📤 Share & Export