This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: A critical security flaw in **Knowage** (BI suite) allows attackers to bypass JNDI name validation. π **Consequences**: Full system compromise.β¦
π‘οΈ **Root Cause**: **CWE-99** (Improper Control of Resource Identification). π **Flaw**: `DataSourceResource.java` fails to ensure `java:comp/env/jdbc/` is at the **start** of the JNDI name.β¦
π¦ **Affected**: **Knowage** versions **prior to 8.1.30**. π’ **Vendor**: Eng (Knowage Labs). π **Component**: SpagoBI API support, specifically the DataSource resource handling. π **Published**: Feb 16, 2025.
Q4What can hackers do? (Privileges/Data)
π» **Attacker Actions**: Can execute arbitrary code or access sensitive resources via JNDI injection. π **Privileges**: High. The CVSS indicates **Complete** impact on Confidentiality, Integrity, and Availability. π΅οΈββοΈ
Q5Is exploitation threshold high? (Auth/Config)
π **Threshold**: **Medium**. βοΈ **Auth**: Requires **High Privileges** (PR:H) to exploit. π **Network**: Network exploitable (AV:N). π« **UI**: No user interaction needed (UI:N).β¦
π **Exploit Status**: **No public PoC** listed in the data. π« **Wild Exploitation**: Unknown. However, the vulnerability is well-defined in the source code commit.β¦
π **Self-Check**: Scan for **Knowage** versions < **8.1.30**. π Look for `DataSourceResource.java` in the SpagoBI API. π οΈ Use DAST tools targeting JNDI injection patterns in Java web apps. π
Q8Is it fixed officially? (Patch/Mitigation)
β **Fixed**: **Yes**. π οΈ **Patch**: Upgrade to **Knowage 8.1.30** or later. π **Commit**: See GitHub commit `f7d0362...` for the fix details. π₯ Download from official sources. π
Q9What if no patch? (Workaround)
π§ **No Patch?**: Isolate the server. π« **Restrict Access**: Limit network access to the SpagoBI API. π **Input Validation**: If possible, manually patch `DataSourceResource.java` to enforce strict JNDI prefix checks. π‘οΈ
Q10Is it urgent? (Priority Suggestion)
π₯ **Urgency**: **CRITICAL**. π¨ **Priority**: **P1**. Even though it requires high privileges, the impact is **Complete** and the attack vector is **Network**. Patch immediately upon upgrade to 8.1.30. β³