Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Denodo Scheduler Vulnerability Let Attackers Execute Remote Code

Posted on June 2, 2025June 2, 2025 By CWS

A major safety vulnerability has been found in Denodo Scheduler, a knowledge administration software program element, that permits attackers to execute distant code on affected methods. 

The flaw, recognized as CVE-2025-26147, exploits a path traversal vulnerability within the Kerberos authentication configuration characteristic, probably compromising the safety of enterprise knowledge administration infrastructure.

Path Traversal Vulnerability 

The vulnerability impacts Denodo Scheduler model 8.0.202309140, a Java-based internet utility that gives time-based job scheduling for knowledge extraction and integration operations. 

The safety flaw resides within the Kerberos authentication configuration performance, particularly within the keytab file add mechanism. 

When directors try and add keytab recordsdata which retailer service principal credentials for Kerberos authentication the appliance fails to correctly validate the filename parameter in multipart type knowledge POST requests.

Attackers can exploit this weak spot by manipulating the filename attribute within the Content material-Disposition HTTP header utilizing listing traversal sequences. 

A malicious payload resembling filename=”../../../../decide/denodo/malicious.file.txt” allows unauthorized file uploads to arbitrary areas on the server’s filesystem. 

Whereas the appliance appends a timestamp to uploaded filenames (e.g., malicious.file-1711156561716.txt), this timestamp is returned to the consumer through HTTP response, eliminating the necessity for attackers to guess the precise filename.

The trail traversal vulnerability turns into critically harmful when mixed with the appliance’s Apache Tomcat deployment setting. 

Safety researchers recognized that the net server’s root listing at /path/to/webroot/sources/apache-tomcat/webapps/ROOT/ offers a really perfect goal for malicious file placement. 

By importing a JavaServer Pages (JSP) internet shell to this location, attackers can obtain full distant code execution capabilities.

The researchers demonstrated the assault utilizing a concise Java internet shell that accepts instructions by way of GET request parameters:

As soon as deployed, this internet shell permits attackers to execute arbitrary system instructions by accessing the uploaded JSP file with command parameters, successfully offering full management over the compromised server.

Danger FactorsDetailsAffected ProductsDenodo Scheduler (v8.0.202309140)ImpactRemote Code Execution (RCE) Exploit PrerequisitesAdministrative entry to configure Kerberos authenticationAbility to add malicious keytab filesApache Tomcat deployment environmentCVSS 3.1 Score8.8 (Excessive)

Mitigations

Rhino Safety Labs, the safety agency that found the vulnerability, reported the problem to Denodo on April 9, 2024. 

The seller demonstrated exemplary response time, acknowledging the vulnerability and releasing a safety patch on April 23, 2024 simply 14 days after preliminary disclosure. 

The vulnerability has been addressed in Denodo 8.0 replace 20240307, and organizations utilizing affected variations ought to instantly apply this safety replace.

This incident underscores the essential significance of implementing safe coding practices, significantly round file add performance and enter validation. 

The vulnerability’s development from a easy path traversal flaw to distant code execution functionality highlights how seemingly minor safety oversights can result in full system compromise. 

Organizations using Denodo Scheduler ought to prioritize patch deployment and conduct safety assessments of their knowledge administration infrastructure to make sure complete safety towards comparable assault vectors.

Discover this Information Attention-grabbing! Observe us on Google Information, LinkedIn, & X to Get Immediate Updates!

Cyber Security News Tags:Attackers, Code, Denodo, Execute, Remote, Scheduler, Vulnerability

Post navigation

Previous Post: Counter Antivirus Service AVCheck Shut Down by Law Enforcement
Next Post: Technical Details Published for Critical Cisco IOS XE Vulnerability

Related Posts

Malware Mastermind Andrei Tarasov Evades US Extradition Returns to Russia Cyber Security News
Aembit Expands Workload IAM to Microsoft Ecosystem, Enhancing Hybrid Security for Non-Human Identities Cyber Security News
SSH Auth Keys Reuse Exposes Sophisticated Targeted Phishing Attack Cyber Security News
Smart Electric Vehicles Face Hidden Cyber Vulnerabilities Exposing Drivers to Risks Cyber Security News
Detecting Lateral Movement in Windows-Based Network Infrastructures Cyber Security News
Samsung MagicINFO 9 Server Vulnerability Let Attackers Write Arbitrary File Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux
  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News