Cyber Posture

CVE-2024-37359

High

Published: 19 February 2025

Published
19 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
EPSS Score 0.0004 13.3th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-37359 is a high-severity SSRF (CWE-918) vulnerability in Pentaho Business Analytics Server (inferred from references). Its CVSS base score is 8.6 (High).

Operationally, ranked at the 13.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Validates Host headers and URLs in incoming requests to ensure they target only expected destinations, directly preventing SSRF exploitation.

prevent

Remediates the specific SSRF flaw by applying vendor patches to versions 10.2.0.0 or 9.3.0.9, eliminating the Host header validation failure.

preventdetect

Monitors and controls outbound communications at system boundaries to block or detect requests to unauthorized internal hosts, ports, or protocols.

NVD Description

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. (CWE-918) Hitachi Vantara Pentaho…

more

Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not validate the Host header of incoming HTTP/HTTPS requests. By providing URLs to unexpected hosts or ports, attackers can make it appear that the server is sending the request, possibly bypassing access controls such as firewalls that prevent the attackers from accessing the URLs directly. The server can be used as a proxy to conduct port scanning of hosts in internal networks, use other URLs such as that can access documents on the system (using file://), or use other protocols such as gopher:// or tftp://, which may provide greater control over the contents of requests.

Deeper analysisAI

CVE-2024-37359 is a Server-Side Request Forgery (SSRF) vulnerability (CWE-918) affecting Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including the 8.3.x series. The web server fails to sufficiently validate the Host header in incoming HTTP/HTTPS requests, allowing it to retrieve contents from arbitrary URLs provided by upstream components without ensuring they target the expected destination.

Remote attackers with network access can exploit this vulnerability without authentication or user interaction (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N, score 8.6). By supplying URLs pointing to unexpected hosts or ports, attackers can trick the server into issuing requests that appear to originate from it, bypassing firewalls or other access controls preventing direct access to internal resources. This enables the server to act as a proxy for port scanning internal networks, accessing local system documents via file:// URLs, or leveraging protocols like gopher:// or tftp:// for enhanced request manipulation.

The official advisory from Hitachi Vantara confirms the issue is resolved in Pentaho Business Analytics Server versions 10.2.0.0 and 9.3.0.9. Security practitioners should upgrade affected installations to these patched versions to mitigate the vulnerability.

Details

CWE(s)

Affected Products

Pentaho
Business Analytics Server
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-27479Shared CWE-918
CVE-2026-0686Shared CWE-918
CVE-2026-7025Shared CWE-918
CVE-2025-21385Shared CWE-918
CVE-2025-52362Shared CWE-918
CVE-2026-44335Shared CWE-918
CVE-2026-33679Shared CWE-918
CVE-2026-31317Shared CWE-918
CVE-2026-5016Shared CWE-918
CVE-2026-33626Shared CWE-918

References