Incorrect input validation for the default-storage-path in the settings page in Jedox 2020.2.5 allows remote, authenticated users to specify the location as Webroot directory. Consecutive file uploads can lead to the execution of arbitrary code.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/172154/Jedox-2020.2.5-Configurable-Storage-Path-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://docs.syslifters.com/assets/vulnerability-disclosure/Vulnerability-Disclosure-Jedox-Jedox-04-2023.pdf | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-05-02T00:00:00
Updated: 2023-05-05T00:00:00
Reserved: 2022-12-21T00:00:00
Link: CVE-2022-47878
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-05-02T20:15:10.647
Modified: 2023-05-10T14:10:16.187
Link: CVE-2022-47878
JSON object: View
Redhat Information
No data.
CWE