{ "Name": "Pentaho Business Analytics 9.1 query sqli (CVE-2021-34684)", "Description": "

Pentaho Business Analytics is a business analysis platform that enables you to safely access, integrate, operate, visualize and analyze big data assets.

There is a SQL injection vulnerability in the query parameter of the /pentaho/api/repos/dashboards/editor path. Attackers can cooperate with CVE-2021-31602 to execute arbitrary SQL statements without authorization, obtain sensitive information such as account passwords, and further take over the system.

", "Product": "Pentaho", "Homepage": "https://help.hitachivantara.com/Documentation/Pentaho/9.1", "DisclosureDate": "2021-11-07", "Author": "1291904552@qq.com", "FofaQuery": "body=\"j_username\" && body=\"j_password\" && body=\"pentaho\"", "GobyQuery": "body=\"j_username\" && body=\"j_password\" && body=\"pentaho\"", "Level": "2", "Impact": "

There is a SQL injection vulnerability in the query parameter of the /pentaho/api/repos/dashboards/editor path. Attackers can cooperate with CVE-2021-31602 to execute arbitrary SQL statements without authorization, obtain sensitive information such as account passwords, and further take over the system.

", "Translation": { "CN": { "Name": "Pentaho 业务分析平台9.1版本 query 参数SQL注入漏洞(CVE-2021-34684)", "VulType": [ "SQL注入" ], "Tags": [ "SQL注入" ], "Description": "

Pentaho Business Analytics是一款使您能够安全地访问、集成、操作、可视化和分析大数据资产的业务分析平台。

在/pentaho/api/repos/dashboards/editor路径query参数存在SQL注入漏洞,攻击者可配合CVE-2021-31602未授权执行任意SQL语句,获取账号密码等敏感信息,进一步接管系统。

", "Impact": "

在/pentaho/api/repos/dashboards/editor路径query参数存在SQL注入漏洞,攻击者可配合CVE-2021-31602未授权执行任意SQL语句,获取账号密码等敏感信息,进一步接管系统。

", "Product": "Pentaho", "Recommendation": "

⼚商已发布了漏洞修复程序,请及时关注更新: https://help.hitachivantara.com/Documentation/Pentaho/9.1

1、通过防⽕墙等安全设备设置访问策略,设置⽩名单访问。

2、升级Apache系统版本。

" }, "EN": { "Name": "Pentaho Business Analytics 9.1 query sqli (CVE-2021-34684)", "VulType": [ "sqli" ], "Tags": [ "sqli" ], "Description": "

Pentaho Business Analytics is a business analysis platform that enables you to safely access, integrate, operate, visualize and analyze big data assets.

There is a SQL injection vulnerability in the query parameter of the /pentaho/api/repos/dashboards/editor path. Attackers can cooperate with CVE-2021-31602 to execute arbitrary SQL statements without authorization, obtain sensitive information such as account passwords, and further take over the system.

", "Impact": "

There is a SQL injection vulnerability in the query parameter of the /pentaho/api/repos/dashboards/editor path. Attackers can cooperate with CVE-2021-31602 to execute arbitrary SQL statements without authorization, obtain sensitive information such as account passwords, and further take over the system.

", "Product": "Pentaho", "Recommendation": "

The vendor has released a bug fix, please pay attention to the update in time: https://help.hitachivantara.com/Documentation/Pentaho/9.1

1. Set access policies and whitelist access through security devices such as firewalls.

2.Upgrade the Apache system version.

" } }, "References": [ "https://packetstormsecurity.com/files/164791/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-SQL-Injection.html" ], "HasExp": true, "ExpParams": [ { "name": "sqlQuery", "type": "input", "value": "SELECT DISTINCT(COALESCE(CAST(schemaname AS VARCHAR(10000))::text,(CHR(32)))) FROM pg_tables OFFSET 0 LIMIT 1)" } ], "ExpTips": null, "ScanSteps": [ "AND", { "Request": { "method": "GET", "uri": "/test.php", "follow_redirect": true, "header": {}, "data_type": "text", "data": "" }, "ResponseTest": { "type": "group", "operation": "AND", "checks": [ { "type": "item", "variable": "$code", "operation": "==", "value": "200", "bz": "" }, { "type": "item", "variable": "$body", "operation": "contains", "value": "test", "bz": "" } ] }, "SetVariable": [] } ], "ExploitSteps": [ "AND", { "Request": { "method": "GET", "uri": "/test.php", "follow_redirect": true, "header": {}, "data_type": "text", "data": "" }, "ResponseTest": { "type": "group", "operation": "AND", "checks": [ { "type": "item", "variable": "$code", "operation": "==", "value": "200", "bz": "" }, { "type": "item", "variable": "$body", "operation": "contains", "value": "test", "bz": "" } ] }, "SetVariable": [] } ], "Tags": [ "sqli" ], "VulType": [ "sqli" ], "CVEIDs": [ "CVE-CVE-2021-34684" ], "CVSSScore": "9.8", "AttackSurfaces": { "Application": [ "Pentaho" ], "Support": null, "Service": null, "System": null, "Hardware": null }, "Recommendation": "

The vendor has released a bug fix, please pay attention to the update in time: https://help.hitachivantara.com/Documentation/Pentaho/9.1

1. Set access policies and whitelist access through security devices such as firewalls.

2. Upgrade the Apache system version.

", "CNNVD": [ "" ], "CNVD": [ "" ] }