Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-57971 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A critical security flaw in **Knowage** (BI suite) allows attackers to bypass JNDI name validation. πŸ“‰ **Consequences**: Full system compromise.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-99** (Improper Control of Resource Identification). πŸ› **Flaw**: `DataSourceResource.java` fails to ensure `java:comp/env/jdbc/` is at the **start** of the JNDI name.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: **Knowage** versions **prior to 8.1.30**. 🏒 **Vendor**: Eng (Knowage Labs). πŸ“Œ **Component**: SpagoBI API support, specifically the DataSource resource handling. πŸ“… **Published**: Feb 16, 2025.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Attacker Actions**: Can execute arbitrary code or access sensitive resources via JNDI injection. πŸ”“ **Privileges**: High. The CVSS indicates **Complete** impact on Confidentiality, Integrity, and Availability. πŸ•΅οΈβ€β™‚οΈ

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Threshold**: **Medium**. βš–οΈ **Auth**: Requires **High Privileges** (PR:H) to exploit. 🌐 **Network**: Network exploitable (AV:N). 🚫 **UI**: No user interaction needed (UI:N).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Exploit Status**: **No public PoC** listed in the data. 🚫 **Wild Exploitation**: Unknown. However, the vulnerability is well-defined in the source code commit.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **Knowage** versions < **8.1.30**. πŸ“‚ Look for `DataSourceResource.java` in the SpagoBI API. πŸ› οΈ Use DAST tools targeting JNDI injection patterns in Java web apps. πŸ“Š

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **Yes**. πŸ› οΈ **Patch**: Upgrade to **Knowage 8.1.30** or later. πŸ”— **Commit**: See GitHub commit `f7d0362...` for the fix details. πŸ“₯ Download from official sources. πŸ“

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Isolate the server. 🚫 **Restrict Access**: Limit network access to the SpagoBI API. πŸ”’ **Input Validation**: If possible, manually patch `DataSourceResource.java` to enforce strict JNDI prefix checks. πŸ›‘οΈ

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: **P1**. Even though it requires high privileges, the impact is **Complete** and the attack vector is **Network**. Patch immediately upon upgrade to 8.1.30. ⏳