Description

Acunetix determined that it was possible to access Pentaho API without authentication with a specially crafted HTTP request.

Remediation

Upgrade to the latest version of Pentaho

References

Related Vulnerabilities