CVE-2024-5705

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authorization checks in Hitachi Vantara Pentaho Business Analytics Server, potentially accessing unauthorized data or performing restricted actions. Affected systems include versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, with default configurations being vulnerable.

💻 Affected Systems

Products:
  • Hitachi Vantara Pentaho Business Analytics Server
Versions: Versions before 10.2.0.0 and 9.3.0.9, including all 8.3.x versions
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Modules allowing system process execution are enabled by default in affected versions

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute system-level processes, leading to complete system compromise, data exfiltration, or denial of service.

🟠

Likely Case

Unauthorized users gain access to sensitive business analytics data or perform administrative actions they shouldn't have permission for.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the Pentaho application layer only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of Pentaho's authorization mechanisms and access to vulnerable endpoints

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.2.0.0 or 9.3.0.9

Vendor Advisory: https://support.pentaho.com/hc/en-us/articles/34296615099405--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Incorrect-Authorization-Versions-before-10-2-0-0-and-9-3-0-9-including-8-3-x-Impacted-CVE-2024-5705

Restart Required: No

Instructions:

1. Download and install version 10.2.0.0 or 9.3.0.9 from official Pentaho sources. 2. Follow standard upgrade procedures. 3. Verify authorization checks are functioning correctly post-upgrade.

🔧 Temporary Workarounds

Disable vulnerable modules

all

Identify and disable modules that allow system process execution if not required for business operations

Network segmentation

all

Restrict network access to Pentaho servers to only authorized users and systems

🧯 If You Can't Patch

  • Implement strict network access controls and firewall rules to limit exposure
  • Enable detailed logging and monitoring for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Pentaho server version via admin console or configuration files. If version is below 10.2.0.0 or 9.3.0.9 (including 8.3.x), system is vulnerable.

Check Version:

Check pentaho-server/tomcat/webapps/pentaho/META-INF/maven/pentaho/pentaho-server/pom.xml or admin console version display

Verify Fix Applied:

After patching, verify version is 10.2.0.0 or 9.3.0.9 or higher. Test authorization controls with test accounts having different privilege levels.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to restricted endpoints
  • Unexpected system process execution from Pentaho context
  • Failed authorization checks in audit logs

Network Indicators:

  • Unusual traffic patterns to Pentaho administrative endpoints
  • Requests bypassing normal authentication flows

SIEM Query:

source="pentaho" AND (event_type="authorization_failure" OR process_execution="unexpected")

🔗 References

📤 Share & Export