{ "Name": "Pentaho Business Analytics 9.1 Information leakage (CVE-2021-31601)", "Description": "

Pentaho Business Analytics is a business analysis platform that enables you to safely access, integrate, operate, visualize and analyze big data assets.

A verified low-privilege attacker (tiffany:password) can list the connection details of all data sources used by Pentaho through the data source management service of /pentaho/webservices/datasourceMgmtService.

", "Product": "Pentaho", "Homepage": "https://help.hitachivantara.com/Documentation/Pentaho/9.1", "DisclosureDate": "2021-11-08", "Author": "1291904552@qq.com", "FofaQuery": "body=\"j_username\" && body=\"j_password\" && body=\"pentaho\"", "GobyQuery": "body=\"j_username\" && body=\"j_password\" && body=\"pentaho\"", "Level": "2", "Impact": "

A verified low-privilege attacker (tiffany:password) can list the connection details of all data sources used by Pentaho through the data source management service of /pentaho/webservices/datasourceMgmtService.

", "Translation": { "CN": { "Name": "Pentaho 业务分析平台9.1版本后台信息泄露漏洞(CVE-2021-31601)", "VulType": [ "信息泄露" ], "Tags": [ "信息泄露" ], "Description": "

Pentaho Business Analytics是一款使您能够安全地访问、集成、操作、可视化和分析大数据资产的业务分析平台。

通过验证的低权限攻击者(tiffany:password)可通过/pentaho/webservices/datasourceMgmtService 的数据源管理服务列出 Pentaho 使用的所有数据源的连接详细信息。

", "Impact": "

通过验证的低权限攻击者(tiffany:password)可通过/pentaho/webservices/datasourceMgmtService 的数据源管理服务列出 Pentaho 使用的所有数据源的连接详细信息。

", "Product": "Pentaho", "Recommendation": "

⼚商已发布了漏洞修复程序,请及时关注更新: https://help.hitachivantara.com/Documentation/Pentaho/9.1

1、通过防⽕墙等安全设备设置访问策略,设置⽩名单访问。

2、升级Apache系统版本。

" }, "EN": { "Name": "Pentaho Business Analytics 9.1 Information leakage (CVE-2021-31601)", "VulType": [ "infoleak" ], "Tags": [ "infoleak" ], "Description": "

Pentaho Business Analytics is a business analysis platform that enables you to safely access, integrate, operate, visualize and analyze big data assets.

A verified low-privilege attacker (tiffany:password) can list the connection details of all data sources used by Pentaho through the data source management service of /pentaho/webservices/datasourceMgmtService.

", "Impact": "

A verified low-privilege attacker (tiffany:password) can list the connection details of all data sources used by Pentaho through the data source management service of /pentaho/webservices/datasourceMgmtService.

", "Product": "Pentaho", "Recommendation": "

The vendor has released a bug fix, please pay attention to the update in time: https://help.hitachivantara.com/Documentation/Pentaho/9.1

1. Set access policies and whitelist access through security devices such as firewalls.

2.Upgrade the Apache system version.

" } }, "References": [ "https://packetstormsecurity.com/files/164779/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Insufficient-Access-Control.html" ], "HasExp": true, "ExpParams": [ { "name": "AttackType", "type": "select", "value": "usernames,databases" } ], "ExpTips": null, "ScanSteps": [ "AND", { "Request": { "method": "GET", "uri": "/test.php", "follow_redirect": true, "header": {}, "data_type": "text", "data": "" }, "ResponseTest": { "type": "group", "operation": "AND", "checks": [ { "type": "item", "variable": "$code", "operation": "==", "value": "200", "bz": "" }, { "type": "item", "variable": "$body", "operation": "contains", "value": "test", "bz": "" } ] }, "SetVariable": [] } ], "ExploitSteps": [ "AND", { "Request": { "method": "GET", "uri": "/test.php", "follow_redirect": true, "header": {}, "data_type": "text", "data": "" }, "ResponseTest": { "type": "group", "operation": "AND", "checks": [ { "type": "item", "variable": "$code", "operation": "==", "value": "200", "bz": "" }, { "type": "item", "variable": "$body", "operation": "contains", "value": "test", "bz": "" } ] }, "SetVariable": [] } ], "Tags": [ "infoleak" ], "VulType": [ "infoleak" ], "CVEIDs": [ "CVE-2021-31601" ], "CVSSScore": "6.0", "AttackSurfaces": { "Application": [ "Pentaho" ], "Support": null, "Service": null, "System": null, "Hardware": null }, "Recommendation": "

The vendor has released a bug fix, please pay attention to the update in time: https://help.hitachivantara.com/Documentation/Pentaho/9.1

1. Set access policies and whitelist access through security devices such as firewalls.

2. Upgrade the Apache system version.

", "CNNVD": [ "" ], "CNVD": [ "" ] }