CVE-2024-37359
Published: 19 February 2025
Summary
CVE-2024-37359 is a high-severity SSRF (CWE-918) vulnerability in Pentaho Business Analytics Server (inferred from references). Its CVSS base score is 8.6 (High).
Operationally, ranked at the 13.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Validates Host headers and URLs in incoming requests to ensure they target only expected destinations, directly preventing SSRF exploitation.
Remediates the specific SSRF flaw by applying vendor patches to versions 10.2.0.0 or 9.3.0.9, eliminating the Host header validation failure.
Monitors and controls outbound communications at system boundaries to block or detect requests to unauthorized internal hosts, ports, or protocols.
NVD Description
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. (CWE-918) Hitachi Vantara Pentaho…
more
Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not validate the Host header of incoming HTTP/HTTPS requests. By providing URLs to unexpected hosts or ports, attackers can make it appear that the server is sending the request, possibly bypassing access controls such as firewalls that prevent the attackers from accessing the URLs directly. The server can be used as a proxy to conduct port scanning of hosts in internal networks, use other URLs such as that can access documents on the system (using file://), or use other protocols such as gopher:// or tftp://, which may provide greater control over the contents of requests.
Deeper analysisAI
CVE-2024-37359 is a Server-Side Request Forgery (SSRF) vulnerability (CWE-918) affecting Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including the 8.3.x series. The web server fails to sufficiently validate the Host header in incoming HTTP/HTTPS requests, allowing it to retrieve contents from arbitrary URLs provided by upstream components without ensuring they target the expected destination.
Remote attackers with network access can exploit this vulnerability without authentication or user interaction (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N, score 8.6). By supplying URLs pointing to unexpected hosts or ports, attackers can trick the server into issuing requests that appear to originate from it, bypassing firewalls or other access controls preventing direct access to internal resources. This enables the server to act as a proxy for port scanning internal networks, accessing local system documents via file:// URLs, or leveraging protocols like gopher:// or tftp:// for enhanced request manipulation.
The official advisory from Hitachi Vantara confirms the issue is resolved in Pentaho Business Analytics Server versions 10.2.0.0 and 9.3.0.9. Security practitioners should upgrade affected installations to these patched versions to mitigate the vulnerability.
Details
- CWE(s)