FKIE_CVE-2015-6940
Vulnerability from fkie_nvd - Published: 2015-09-22 15:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
The GetResource servlet in Pentaho Business Analytics (BA) Suite 4.5.x, 4.8.x, and 5.0.x through 5.2.x and Pentaho Data Integration (PDI) Suite 4.3.x, 4.4.x, and 5.0.x through 5.2.x does not restrict access to files in the pentaho-solutions/system folder, which allows remote attackers to obtain passwords and other sensitive information via a file name in the resource parameter.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| pentaho | data_integration | 4.3 | |
| pentaho | data_integration | 4.4 | |
| pentaho | data_integration | 5.0 | |
| pentaho | data_integration | 5.1 | |
| pentaho | data_integration | 5.2 | |
| pentaho | business_analytics | 4.5 | |
| pentaho | business_analytics | 4.8 | |
| pentaho | business_analytics | 5.0 | |
| pentaho | business_analytics | 5.1 | |
| pentaho | business_analytics | 5.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pentaho:data_integration:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8B2C1FC8-0787-4357-8B0A-125D2BF3418B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pentaho:data_integration:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6C66215B-13D7-4B34-A33B-EDFB77E5D128",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pentaho:data_integration:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CBBE7301-81A0-41AB-9EFB-28791E6544AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pentaho:data_integration:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7246E3BC-3EB7-4AE6-B108-CB1B0786F275",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pentaho:data_integration:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "66ADD153-3A7D-4D71-963F-EAA3FE0D4A4E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pentaho:business_analytics:4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FE9C6E6F-CE9C-4FDA-9405-E03B21EBA153",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pentaho:business_analytics:4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "BF618DEB-8AF9-4DB5-B03B-E69219EE020E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pentaho:business_analytics:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C0E25BD3-540F-4722-B019-F2709D398536",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pentaho:business_analytics:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E6A6A70A-DDA1-41AF-8E24-2AE698813B69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pentaho:business_analytics:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B3A812-E5E7-42E1-A107-2AEE2232A0FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The GetResource servlet in Pentaho Business Analytics (BA) Suite 4.5.x, 4.8.x, and 5.0.x through 5.2.x and Pentaho Data Integration (PDI) Suite 4.3.x, 4.4.x, and 5.0.x through 5.2.x does not restrict access to files in the pentaho-solutions/system folder, which allows remote attackers to obtain passwords and other sensitive information via a file name in the resource parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad en el servlet GetResource en Pentaho Business Analytics (BA) Suite 4.5.x, 4.8.x y 5.0.x hasta la versi\u00f3n 5.2.x y Pentaho Data Integration (PDI) Suite 4.3.x, 4.4.x, y 5.0.x hasta la versi\u00f3n 5.2.x, no restringe el acceso a los archivos en la carpeta pentaho-solutions/system, lo que permite a atacantes remotos obtener contrase\u00f1as y otra informaci\u00f3n sensible a trav\u00e9s de un nombre de archivo en el par\u00e1metro resource."
}
],
"id": "CVE-2015-6940",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-09-22T15:59:00.107",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.com/files/133601/Pentaho-5.2.x-BA-Suite-PDI-Information-Disclosure.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/536477/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://support.pentaho.com/entries/78884125-Security-Vulnerability-Announcement-Feb-2015"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.com/files/133601/Pentaho-5.2.x-BA-Suite-PDI-Information-Disclosure.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/536477/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://support.pentaho.com/entries/78884125-Security-Vulnerability-Announcement-Feb-2015"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…