CVE-2025-0756

9.1 CRITICAL

📋 TL;DR

This vulnerability in Hitachi Vantara Pentaho Data Integration & Analytics allows attackers to inject malicious JNDI identifiers when creating platform data sources, potentially leading to unauthorized access to sensitive data and remote code execution. Affected organizations are those running vulnerable versions of Pentaho before 10.2.0.2, including 9.3.x and 8.3.x branches.

💻 Affected Systems

Products:
  • Hitachi Vantara Pentaho Data Integration & Analytics
Versions: Versions before 10.2.0.2, including 9.3.x and 8.3.x
Operating Systems: All supported operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the platform data source creation functionality; exploitation requires access to create or modify data sources.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full system compromise, allowing attackers to access sensitive configuration files, modify data, and establish persistent access to the environment.

🟠

Likely Case

Unauthorized access to sensitive data and configuration files, potentially leading to data exfiltration or privilege escalation within the Pentaho environment.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only allowing access to non-critical resources within the application scope.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to create platform data sources; JNDI injection is a well-known attack vector with established exploitation patterns.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.2.0.2

Vendor Advisory: https://support.pentaho.com/hc/en-us/articles/35771876077709

Restart Required: Yes

Instructions:

1. Download Pentaho version 10.2.0.2 or later from official sources. 2. Backup current installation and configuration. 3. Apply the update following Hitachi Vantara's upgrade documentation. 4. Restart all Pentaho services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Data Source Creation Permissions

all

Limit user permissions to only trusted administrators for creating or modifying platform data sources.

Network Segmentation

all

Isolate Pentaho servers from sensitive internal resources and restrict outbound connections to prevent JNDI callbacks.

🧯 If You Can't Patch

  • Implement strict access controls to limit who can create or modify data sources
  • Deploy network monitoring and intrusion detection systems to alert on suspicious JNDI-related activity

🔍 How to Verify

Check if Vulnerable:

Check Pentaho version via administration console or by examining installation files; versions before 10.2.0.2 are vulnerable.

Check Version:

Check Pentaho administration console or review version.txt in installation directory

Verify Fix Applied:

Verify the installed version is 10.2.0.2 or later and test data source creation functionality with restricted JNDI identifiers.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JNDI lookup patterns in application logs
  • Failed or unexpected data source creation attempts
  • Suspicious LDAP or directory service connections

Network Indicators:

  • Outbound connections to unexpected LDAP servers
  • DNS requests for suspicious JNDI-related domains

SIEM Query:

source="pentaho" AND (jndi OR ldap OR "data source creation") AND status=failed

🔗 References

📤 Share & Export