Jedox 2020.2.5 Configurable Storage Path Remote Code Executi

Jedox 2020.2.5 Configurable Storage Path Remote Code Execution

# Exploit Title: Jedox 2020.2.5 - Remote Code Execution via Configurable Storage Path# Date: 28/04/2023# Exploit Author: Team Syslifters / Christoph MAHRL, Aron MOLNAR, Patrick PIRKER and Michael WEDL# Vendor Homepage: https://jedox.com# Version: Jedox 2020.2 (20.2.5) and older# CVE : CVE-2022-47878Introduction=================Incorrect input validation for the default storage path variable in the settings page allows remote,

Related Keywords

, Team Syslifters Christoph , Exploit Title , Remote Code Execution , Configurable Storage , Exploit Author , Team Syslifters , Vendor Homepage ,

© 2025 Vimarsana