Goby/json/Pentaho-Business-Analytics-...

146 lines
6.3 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Pentaho Business Analytics 9.1 query sqli (CVE-2021-34684)",
"Description": "<p>Pentaho Business Analytics is a business analysis platform that enables you to safely access, integrate, operate, visualize and analyze big data assets.</p><p>There is a SQL injection vulnerability in the query parameter of the /pentaho/api/repos/dashboards/editor path. Attackers can cooperate with CVE-2021-31602 to execute arbitrary SQL statements without authorization, obtain sensitive information such as account passwords, and further take over the system.</p>",
"Product": "Pentaho",
"Homepage": "https://help.hitachivantara.com/Documentation/Pentaho/9.1",
"DisclosureDate": "2021-11-07",
"Author": "1291904552@qq.com",
"FofaQuery": "body=\"j_username\" && body=\"j_password\" && body=\"pentaho\"",
"GobyQuery": "body=\"j_username\" && body=\"j_password\" && body=\"pentaho\"",
"Level": "2",
"Impact": "<p>There is a SQL injection vulnerability in the query parameter of the /pentaho/api/repos/dashboards/editor path. Attackers can cooperate with CVE-2021-31602 to execute arbitrary SQL statements without authorization, obtain sensitive information such as account passwords, and further take over the system.</p>",
"Translation": {
"CN": {
"Name": "Pentaho 业务分析平台9.1版本 query 参数SQL注入漏洞CVE-2021-34684",
"VulType": [
"SQL注入"
],
"Tags": [
"SQL注入"
],
"Description": "<p>Pentaho Business Analytics是一款使您能够安全地访问、集成、操作、可视化和分析大数据资产的业务分析平台。</p><p>在/pentaho/api/repos/dashboards/editor路径query参数存在SQL注入漏洞攻击者可配合CVE-2021-31602未授权执行任意SQL语句获取账号密码等敏感信息进一步接管系统。</p>",
"Impact": "<p>在/pentaho/api/repos/dashboards/editor路径query参数存在SQL注入漏洞攻击者可配合CVE-2021-31602未授权执行任意SQL语句获取账号密码等敏感信息进一步接管系统。</p>",
"Product": "Pentaho",
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新: <a href=\"https://help.hitachivantara.com/Documentation/Pentaho/9.1\">https://help.hitachivantara.com/Documentation/Pentaho/9.1</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、升级Apache系统版本。</p>"
},
"EN": {
"Name": "Pentaho Business Analytics 9.1 query sqli (CVE-2021-34684)",
"VulType": [
"sqli"
],
"Tags": [
"sqli"
],
"Description": "<p>Pentaho Business Analytics is a business analysis platform that enables you to safely access, integrate, operate, visualize and analyze big data assets.</p><p>There is a SQL injection vulnerability in the query parameter of the /pentaho/api/repos/dashboards/editor path. Attackers can cooperate with CVE-2021-31602 to execute arbitrary SQL statements without authorization, obtain sensitive information such as account passwords, and further take over the system.</p>",
"Impact": "<p>There is a SQL injection vulnerability in the query parameter of the /pentaho/api/repos/dashboards/editor path. Attackers can cooperate with CVE-2021-31602 to execute arbitrary SQL statements without authorization, obtain sensitive information such as account passwords, and further take over the system.</p>",
"Product": "Pentaho",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://help.hitachivantara.com/Documentation/Pentaho/9.1\">https://help.hitachivantara.com/Documentation/Pentaho/9.1</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.Upgrade the Apache system version.</p>"
}
},
"References": [
"https://packetstormsecurity.com/files/164791/Pentaho-Business-Analytics-Pentaho-Business-Server-9.1-SQL-Injection.html"
],
"HasExp": true,
"ExpParams": [
{
"name": "sqlQuery",
"type": "input",
"value": "SELECT DISTINCT(COALESCE(CAST(schemaname AS VARCHAR(10000))::text,(CHR(32)))) FROM pg_tables OFFSET 0 LIMIT 1)"
}
],
"ExpTips": null,
"ScanSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/test.php",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "test",
"bz": ""
}
]
},
"SetVariable": []
}
],
"ExploitSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/test.php",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "contains",
"value": "test",
"bz": ""
}
]
},
"SetVariable": []
}
],
"Tags": [
"sqli"
],
"VulType": [
"sqli"
],
"CVEIDs": [
"CVE-CVE-2021-34684"
],
"CVSSScore": "9.8",
"AttackSurfaces": {
"Application": [
"Pentaho"
],
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://help.hitachivantara.com/Documentation/Pentaho/9.1\">https://help.hitachivantara.com/Documentation/Pentaho/9.1</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2. Upgrade the Apache system version.</p>",
"CNNVD": [
""
],
"CNVD": [
""
]
}