Overview The product uses external input to...
Moderate severity
Unreviewed
Published
Apr 17, 2025
to the GitHub Advisory Database
•
Updated Apr 17, 2025
Description
Published by the National Vulnerability Database
Apr 16, 2025
Published to the GitHub Advisory Database
Apr 17, 2025
Last updated
Apr 17, 2025
Overview
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35)
Description
Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not sanitize a user input used as a file path through the CGG Draw API.
Impact
This allows attackers to traverse the file system to access files or directories that are outside of the restricted directory.
References