Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Denodo Scheduler Vulnerability Let Attackers Execute Remote Code

Posted on June 2, 2025June 2, 2025 By CWS

A major safety vulnerability has been found in Denodo Scheduler, a knowledge administration software program element, that permits attackers to execute distant code on affected methods. 

The flaw, recognized as CVE-2025-26147, exploits a path traversal vulnerability within the Kerberos authentication configuration characteristic, probably compromising the safety of enterprise knowledge administration infrastructure.

Path Traversal Vulnerability 

The vulnerability impacts Denodo Scheduler model 8.0.202309140, a Java-based internet utility that gives time-based job scheduling for knowledge extraction and integration operations. 

The safety flaw resides within the Kerberos authentication configuration performance, particularly within the keytab file add mechanism. 

When directors try and add keytab recordsdata which retailer service principal credentials for Kerberos authentication the appliance fails to correctly validate the filename parameter in multipart type knowledge POST requests.

Attackers can exploit this weak spot by manipulating the filename attribute within the Content material-Disposition HTTP header utilizing listing traversal sequences. 

A malicious payload resembling filename=”../../../../decide/denodo/malicious.file.txt” allows unauthorized file uploads to arbitrary areas on the server’s filesystem. 

Whereas the appliance appends a timestamp to uploaded filenames (e.g., malicious.file-1711156561716.txt), this timestamp is returned to the consumer through HTTP response, eliminating the necessity for attackers to guess the precise filename.

The trail traversal vulnerability turns into critically harmful when mixed with the appliance’s Apache Tomcat deployment setting. 

Safety researchers recognized that the net server’s root listing at /path/to/webroot/sources/apache-tomcat/webapps/ROOT/ offers a really perfect goal for malicious file placement. 

By importing a JavaServer Pages (JSP) internet shell to this location, attackers can obtain full distant code execution capabilities.

The researchers demonstrated the assault utilizing a concise Java internet shell that accepts instructions by way of GET request parameters:

As soon as deployed, this internet shell permits attackers to execute arbitrary system instructions by accessing the uploaded JSP file with command parameters, successfully offering full management over the compromised server.

Danger FactorsDetailsAffected ProductsDenodo Scheduler (v8.0.202309140)ImpactRemote Code Execution (RCE) Exploit PrerequisitesAdministrative entry to configure Kerberos authenticationAbility to add malicious keytab filesApache Tomcat deployment environmentCVSS 3.1 Score8.8 (Excessive)

Mitigations

Rhino Safety Labs, the safety agency that found the vulnerability, reported the problem to Denodo on April 9, 2024. 

The seller demonstrated exemplary response time, acknowledging the vulnerability and releasing a safety patch on April 23, 2024 simply 14 days after preliminary disclosure. 

The vulnerability has been addressed in Denodo 8.0 replace 20240307, and organizations utilizing affected variations ought to instantly apply this safety replace.

This incident underscores the essential significance of implementing safe coding practices, significantly round file add performance and enter validation. 

The vulnerability’s development from a easy path traversal flaw to distant code execution functionality highlights how seemingly minor safety oversights can result in full system compromise. 

Organizations using Denodo Scheduler ought to prioritize patch deployment and conduct safety assessments of their knowledge administration infrastructure to make sure complete safety towards comparable assault vectors.

Discover this Information Attention-grabbing! Observe us on Google Information, LinkedIn, & X to Get Immediate Updates!

Cyber Security News Tags:Attackers, Code, Denodo, Execute, Remote, Scheduler, Vulnerability

Post navigation

Previous Post: Counter Antivirus Service AVCheck Shut Down by Law Enforcement
Next Post: Technical Details Published for Critical Cisco IOS XE Vulnerability

Related Posts

Ubiquiti UniFi Protect Camera Vulnerability Allows Remote Code Execution Cyber Security News
Recurring Supply‑Chain Lapses Expose UEFI Firmware to Pre‑OS Threats Cyber Security News
LapDogs Hackers Leverages 1,000 SOHO Devices Using a Custom Backdoor to Act Covertly Cyber Security News
Darknet Market Archetyp Dismantled by Authorities in Joint Action ‘Operation Deep Sentinel’ Cyber Security News
NVIDIA Container Toolkit Vulnerability Allows Elevated Arbitrary Code Execution Cyber Security News
Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China
  • Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News