Remote code execution via crafted pentaho report uploaded using default credentials for pentaho business server

Disclosed: 2023-12-31 21:08:44 By zer0code To mtn_group
Critical
Vulnerability Details
## Summary: Good day, While I do recon for mtn.ci domain I found Pentaho business server at https://sm.mtn.ci:8888/pentaho with default credentials admin/password ,then I figured that I can upload prpt reports to server which could use some beanshell,js and java to achieve RCE ## Steps To Reproduce: 1. Login to https://sm.mtn.ci:8888/pentaho admin/password {F1878259} 2. Use Pentaho report designer to create malicious report file {F1878260} 3. Upload and run the report {F1878261} {F1878262} ## Impact The impact of an RCE vulnerability can range from malware execution to an attacker gaining full control over a compromised server.
Actions
View on HackerOne
Report Stats
  • Report ID: 1677047
  • State: Closed
  • Substate: resolved
  • Upvotes: 56
Share this report