5
CVSSv2

CVE-2021-31602

Published: 08/11/2021 Updated: 12/07/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

An issue exists in Hitachi Vantara Pentaho up to and including 9.1 and Pentaho Business Intelligence Server up to and including 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

hitachi vantara pentaho

hitachi vantara pentaho business intelligence server

Exploits

Pentaho Business Analytics and Pentaho Business Server versions 91 and below suffer from an authentication bypass vulnerability related to Spring APIs ...
Pentaho allows users to create and manage Data Sources Users can select a Data Source when creating a Dashboard through the Pentaho User Console When a Data Source is added, Pentaho makes a HTTP request to the dashboards editor (/pentaho/api/repos/dashboards/editor) in order to test the connection by executing a test SQL query However, further e ...

Github Repositories

Pentaho Authentication Bypass

PWNentaho Pentaho Authentication Bypass [CVE-2021-31602] (nvdnistgov/vuln/detail/CVE-2021-31602)