Vulnerability Description
Incorrect input validation for the default-storage-path in the settings page in Jedox 2020.2.5 allows remote, authenticated users to specify the location as Webroot directory. Consecutive file uploads can lead to the execution of arbitrary code. NOTE: The vendor states that the vulnerability affects installations running version 22.2 or earlier. The issue was resolved with the version 22.3 and later versions are not affected. Additionally, the vendor states that this vulnerability affects on-premises deployments only and that it does not impact cloud-hosted or SaaS environments.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jedox | Jedox | 2020.2.5 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/172154/Jedox-2020.2.5-Configurable-Storage-ExploitThird Party AdvisoryVDB Entry
- https://docs.syslifters.com/assets/vulnerability-disclosure/Vulnerability-DiscloExploitThird Party Advisory
- https://jedox.mantishub.io/app/issues/57238
- http://packetstormsecurity.com/files/172154/Jedox-2020.2.5-Configurable-Storage-ExploitThird Party AdvisoryVDB Entry
- https://docs.syslifters.com/assets/vulnerability-disclosure/Vulnerability-DiscloExploitThird Party Advisory
FAQ
What is CVE-2022-47878?
CVE-2022-47878 is a vulnerability with a CVSS score of 8.8 (HIGH). Incorrect input validation for the default-storage-path in the settings page in Jedox 2020.2.5 allows remote, authenticated users to specify the location as Webroot directory. Consecutive file uploads...
How severe is CVE-2022-47878?
CVE-2022-47878 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-47878?
Check the references section above for vendor advisories and patch information. Affected products include: Jedox Jedox.