Goby/json/Pentaho-Business-Analytics-...

146 lines
5.8 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Pentaho Business Analytics 9.1 Information leakage (CVE-2021-31601)",
"Description": "<p>Pentaho Business Analytics is a business analysis platform that enables you to safely access, integrate, operate, visualize and analyze big data assets.</p><p>A verified low-privilege attacker (tiffany:password) can list the connection details of all data sources used by Pentaho through the data source management service of /pentaho/webservices/datasourceMgmtService.</p>",
"Product": "Pentaho",
"Homepage": "https://help.hitachivantara.com/Documentation/Pentaho/9.1",
"DisclosureDate": "2021-11-08",
"Author": "1291904552@qq.com",
"FofaQuery": "body=\"j_username\" && body=\"j_password\" && body=\"pentaho\"",
"GobyQuery": "body=\"j_username\" && body=\"j_password\" && body=\"pentaho\"",
"Level": "2",
"Impact": "<p>A verified low-privilege attacker (tiffany:password) can list the connection details of all data sources used by Pentaho through the data source management service of /pentaho/webservices/datasourceMgmtService.</p>",
"Translation": {
"CN": {
"Name": "Pentaho 业务分析平台9.1版本后台信息泄露漏洞CVE-2021-31601",
"VulType": [
"信息泄露"
],
"Tags": [
"信息泄露"
],
"Description": "<p>Pentaho Business Analytics是一款使您能够安全地访问、集成、操作、可视化和分析大数据资产的业务分析平台。</p><p>通过验证的低权限攻击者(tiffany:password)可通过/pentaho/webservices/datasourceMgmtService 的数据源管理服务列出 Pentaho 使用的所有数据源的连接详细信息。</p>",
"Impact": "<p>通过验证的低权限攻击者(tiffany:password)可通过/pentaho/webservices/datasourceMgmtService 的数据源管理服务列出 Pentaho 使用的所有数据源的连接详细信息。</p>",
"Product": "Pentaho",
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新: <a href=\"https://help.hitachivantara.com/Documentation/Pentaho/9.1\">https://help.hitachivantara.com/Documentation/Pentaho/9.1</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、升级Apache系统版本。</p>"
},
"EN": {
"Name": "Pentaho Business Analytics 9.1 Information leakage (CVE-2021-31601)",
"VulType": [
"infoleak"
],
"Tags": [
"infoleak"
],
"Description": "<p>Pentaho Business Analytics is a business analysis platform that enables you to safely access, integrate, operate, visualize and analyze big data assets.</p><p>A verified low-privilege attacker (tiffany:password) can list the connection details of all data sources used by Pentaho through the data source management service of /pentaho/webservices/datasourceMgmtService.</p>",
"Impact": "<p>A verified low-privilege attacker (tiffany:password) can list the connection details of all data sources used by Pentaho through the data source management service of /pentaho/webservices/datasourceMgmtService.</p>",
"Product": "Pentaho",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://help.hitachivantara.com/Documentation/Pentaho/9.1\">https://help.hitachivantara.com/Documentation/Pentaho/9.1</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.Upgrade the Apache system version.</p>"
}
},
"References": [
"https://packetstormsecurity.com/files/164779/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-Insufficient-Access-Control.html"
],
"HasExp": true,
"ExpParams": [
{
"name": "AttackType",
"type": "select",
"value": "usernames,databases"
}
],
"ExpTips": null,
"ScanSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/test.php",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "test",
"bz": ""
}
]
},
"SetVariable": []
}
],
"ExploitSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/test.php",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "test",
"bz": ""
}
]
},
"SetVariable": []
}
],
"Tags": [
"infoleak"
],
"VulType": [
"infoleak"
],
"CVEIDs": [
"CVE-2021-31601"
],
"CVSSScore": "6.0",
"AttackSurfaces": {
"Application": [
"Pentaho"
],
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://help.hitachivantara.com/Documentation/Pentaho/9.1\">https://help.hitachivantara.com/Documentation/Pentaho/9.1</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2. Upgrade the Apache system version.</p>",
"CNNVD": [
""
],
"CNVD": [
""
]
}