CVE-2022-47878

Incorrect input validation for the default-storage-path in the settings page in Jedox 2020.2.5 allows remote, authenticated users to specify the location as Webroot directory. Consecutive file uploads can lead to the execution of arbitrary code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jedox:jedox:2020.2.5:*:*:*:*:*:*:*

History

21 Nov 2024, 07:32

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/172154/Jedox-2020.2.5-Configurable-Storage-Path-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/172154/Jedox-2020.2.5-Configurable-Storage-Path-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://docs.syslifters.com/assets/vulnerability-disclosure/Vulnerability-Disclosure-Jedox-Jedox-04-2023.pdf - Exploit, Third Party Advisory () https://docs.syslifters.com/assets/vulnerability-disclosure/Vulnerability-Disclosure-Jedox-Jedox-04-2023.pdf - Exploit, Third Party Advisory

Information

Published : 2023-05-02 20:15

Updated : 2024-11-21 07:32


NVD link : CVE-2022-47878

Mitre link : CVE-2022-47878

CVE.ORG link : CVE-2022-47878


JSON object : View

Products Affected

jedox

  • jedox
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type