vendor:
Pentaho BA Server
by:
dwbzn
9.8
CVSS
CRITICAL
Remote Code Execution (RCE)
78
CWE
Product Name: Pentaho BA Server
Affected Version From: 9.3.0.0-428
Affected Version To: 9.3.0.0-428
Patch Exists: YES
Related CWE: CVE-2022-43769, CVE-2022-43939
CPE: a:hitachivantara:pentaho_ba_server:9.3.0.0-428
Tags: packetstorm,cve,cve2022,rce,ssti,pentaho,kev
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://support.pentaho.com/hc/en-us/articles/14455561548301--Resolved-Pentaho-BA-Server-Failure-to-Sanitize-Special-Elements-into-a-Different-Plane-Special-Element-Injection-Versions-before-9-4-0-1-and-9-3-0-2-including-8-3-x-Impacted-CVE-2022-43769-, https://nvd.nist.gov/vuln/detail/CVE-2022-43769, http://packetstormsecurity.com/files/172296/Pentaho-Business-Server-Authentication-Bypass-SSTI-Code-Execution.html
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'http.favicon.hash:1749354953', 'verified': True, 'vendor': 'hitachi', 'product': 'vantara_pentaho_business_analytics_server'}
Platforms Tested: Windows 11
2022
Pentaho BA Server EE 9.3.0.0-428 – Remote Code Execution (RCE) (Unauthenticated)
This exploit allows an unauthenticated attacker to execute arbitrary code on the vulnerable system by exploiting two CVEs, CVE-2022-43769 and CVE-2022-43939. The exploit works by sending a specially crafted request to the server which contains a command to be executed. The command is sent via a URL parameter and is executed using the Java Runtime.getRuntime().exec() method.
Mitigation:
The best way to mitigate this vulnerability is to ensure that all systems are running the latest version of the software. Additionally, it is recommended to restrict access to the vulnerable system to only trusted users.