9.8
CVSSv3

CVE-2022-43939

Published: 03/04/2023 Updated: 11/05/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Hitachi Vantara Pentaho Business Analytics Server versions prior to 9.4.0.1 and 9.3.0.2, including 8.3.x contain security restrictions using non-canonical URLs which can be circumvented. 

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

hitachi vantara pentaho business analytics server

hitachi vantara pentaho business analytics server 9.4.0.0

Exploits

Pentaho BA Server EE version 9300-428 suffers from a remote code execution vulnerability via a server-side template injection flaw ...
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9401 and 9302, including 83x is vulnerable to an authentication bypass (CVE-2022-43939) and a Server Side Template Injection (SSTI) vulnerability (CVE-2022-43769) that can be chained together to achieve unauthenticated code execution as the user running the Pentaho Business ...
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9401 and 9302, including 83x is vulnerable to an authentication bypass (CVE-2022-43939) and a Server Side Template Injection (SSTI) vulnerability (CVE-2022-43769) that can be chained together to achieve unauthenticated code execution as the user ...

Metasploit Modules

Pentaho Business Server Auth Bypass and Server Side Template Injection RCE

Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, including 8.3.x is vulnerable to an authentication bypass (CVE-2022-43939) and a Server Side Template Injection (SSTI) vulnerability (CVE-2022-43769) that can be chained together to achieve unauthenticated code execution as the user running the Pentaho Business Analytics Server. The first vulnerability (CVE-2022-43939) is an authentication bypass which stems from a regex that allows any URL that ends in "/", followed by "require", optionally "-js" or "-cfg", any character, and then the string "js" followed optionally by "?" and then any characters of the attacker's choice. The second (CVE-2022-43769) is a server side template injection. This vulnerability allows RCE by making a GET request to /api/ldap/config/ldapTreeNodeChildren and setting the url parameter to ThymeLeaf template code. By abusing the ability to execute arbitrary Java classes within Thymeleaf templates, an attacker can execute arbitrary commands as the user running the Pentaho Business Analytics Server.

msf > use exploit/multi/http/pentaho_business_server_authbypass_and_ssti
msf exploit(pentaho_business_server_authbypass_and_ssti) > show targets
    ...targets...
msf exploit(pentaho_business_server_authbypass_and_ssti) > set TARGET < target-id >
msf exploit(pentaho_business_server_authbypass_and_ssti) > show options
    ...show and set options...
msf exploit(pentaho_business_server_authbypass_and_ssti) > exploit