24 lines
893 B
JSON
Raw Normal View History

{
"id": "CVE-2022-47878",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-02T20:15:10.647",
"lastModified": "2023-05-05T19:15:15.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Incorrect input validation for the default-storage-path in the settings page in Jedox 2020.2.5 allows remote, authenticated users to specify the location as Webroot directory. Consecutive file uploads can lead to the execution of arbitrary code."
}
],
"metrics": {},
"references": [
{
"url": "http://packetstormsecurity.com/files/172154/Jedox-2020.2.5-Configurable-Storage-Path-Remote-Code-Execution.html",
"source": "cve@mitre.org"
},
{
"url": "https://docs.syslifters.com/assets/vulnerability-disclosure/Vulnerability-Disclosure-Jedox-Jedox-04-2023.pdf",
"source": "cve@mitre.org"
}
]
}