Overview



 



The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35)



 



Description



 



Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API.



 



Impact



 



This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-11535 Overview   The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35)   Description   Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API.   Impact   This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 17 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Apr 2025 22:45:00 +0000

Type Values Removed Values Added
Description Overview   The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35)   Description   Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API.   Impact   This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
Title Hitachi Vantara Pentaho Data Integration & Analytics – Path Traversal
Weaknesses CWE-35
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: HITVAN

Published:

Updated: 2025-04-17T13:55:34.359Z

Reserved: 2025-01-27T17:24:54.153Z

Link: CVE-2025-24907

cve-icon Vulnrichment

Updated: 2025-04-17T13:41:20.444Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-16T23:15:45.027

Modified: 2025-04-17T20:21:48.243

Link: CVE-2025-24907

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses