Rapid7 Vulnerability & Exploit Database

Pentaho Business Server Auth Bypass and Server Side Template Injection RCE

Back to Search

Pentaho Business Server Auth Bypass and Server Side Template Injection RCE

Disclosed
04/04/2023
Created
05/11/2023

Description

Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.1 and 9.3.0.2, including 8.3.x is vulnerable to an authentication bypass (CVE-2022-43939) and a Server Side Template Injection (SSTI) vulnerability (CVE-2022-43769) that can be chained together to achieve unauthenticated code execution as the user running the Pentaho Business Analytics Server. The first vulnerability (CVE-2022-43939) is an authentication bypass which stems from a regex that allows any URL that ends in "/", followed by "require", optionally "-js" or "-cfg", any character, and then the string "js" followed optionally by "?" and then any characters of the attacker's choice. The second (CVE-2022-43769) is a server side template injection. This vulnerability allows RCE by making a GET request to /api/ldap/config/ldapTreeNodeChildren and setting the url parameter to ThymeLeaf template code. By abusing the ability to execute arbitrary Java classes within Thymeleaf templates, an attacker can execute arbitrary commands as the user running the Pentaho Business Analytics Server.

Author(s)

  • Harry Withington
  • dwbzn
  • jheysel-r7

Platform

Unix,Windows

Architectures

cmd, x86, x64

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/http/pentaho_business_server_authbypass_and_ssti
msf exploit(pentaho_business_server_authbypass_and_ssti) > show targets
    ...targets...
msf exploit(pentaho_business_server_authbypass_and_ssti) > set TARGET < target-id >
msf exploit(pentaho_business_server_authbypass_and_ssti) > show options
    ...show and set options...
msf exploit(pentaho_business_server_authbypass_and_ssti) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;