CVE-2024-37363

6.5 MEDIUM

📋 TL;DR

This vulnerability allows unauthorized users to access data sources they shouldn't have permission to view or modify in Hitachi Vantara Pentaho Business Analytics Server. It affects all versions before 10.2.0.0 and 9.3.0.8, including 8.3.x series. Attackers can potentially view, modify, or delete sensitive business data.

💻 Affected Systems

Products:
  • Hitachi Vantara Pentaho Business Analytics Server
Versions: All versions before 10.2.0.0 and 9.3.0.8, including 8.3.x series
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the data source management service specifically. All deployments with vulnerable versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all business intelligence data, including sensitive financial, customer, or operational information, potentially leading to data destruction or unauthorized data exfiltration.

🟠

Likely Case

Unauthorized access to specific data sources, leading to information disclosure of sensitive business metrics, customer data, or proprietary analytics.

🟢

If Mitigated

Limited impact if network segmentation and strict access controls are in place, though the vulnerability still exists at the application layer.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the Pentaho interface, but the authorization bypass itself is straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.2.0.0 or 9.3.0.8

Vendor Advisory: https://support.pentaho.com/hc/en-us/articles/34296230504589--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Incorrect-Authorization-Versions-before-10-2-0-0-and-9-3-0-8-including-8-3-x-Impacted-CVE-2024-37363

Restart Required: Yes

Instructions:

1. Download the patched version (10.2.0.0 or 9.3.0.8) from official Hitachi Vantara sources. 2. Backup all configurations and data. 3. Follow the official upgrade documentation for your specific version. 4. Restart the Pentaho server after upgrade completion.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Pentaho server to only authorized users and systems

Enhanced Monitoring

all

Implement detailed logging and monitoring of data source access patterns

🧯 If You Can't Patch

  • Implement strict network access controls and firewall rules to limit who can reach the Pentaho server
  • Enable detailed audit logging for all data source management activities and monitor for unauthorized access patterns

🔍 How to Verify

Check if Vulnerable:

Check the Pentaho server version via the web interface (Help → About) or server logs. If version is below 10.2.0.0 or 9.3.0.8 (and not 8.3.x), the system is vulnerable.

Check Version:

Check Pentaho web interface at /pentaho/Home or examine server startup logs for version information.

Verify Fix Applied:

After patching, verify the version shows 10.2.0.0 or 9.3.0.8 or higher. Test data source access with different user roles to ensure proper authorization checks.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to data source management endpoints
  • User accessing data sources outside their normal role patterns
  • Failed authorization checks in audit logs

Network Indicators:

  • Unusual data source access patterns
  • Requests to data source management APIs from unauthorized IPs

SIEM Query:

source="pentaho" AND (event_type="data_source_access" OR endpoint="/api/data-sources") AND user_role!="admin" AND result="success"

🔗 References

📤 Share & Export