PwnDoc is a penetration test report generator. In versions up to and including 0.5.3, an authenticated user is able to crash the backend by raising a `UnhandledPromiseRejection` on audits which exits the backend. The user doesn't need to know the audit id, since a bad audit id will also raise the rejection. With the backend being unresponsive, the whole application becomes unusable for all users of the application. As of time of publication, no known patches are available.
References
Link | Resource |
---|---|
https://github.com/pwndoc/pwndoc/security/advisories/GHSA-ggqg-3f7v-c8rc | Exploit Vendor Advisory |
Configurations
History
18 Apr 2025, 17:35
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:a:pwndoc_project:pwndoc:*:*:*:*:*:*:*:* | |
First Time |
Pwndoc Project pwndoc
Pwndoc Project |
|
Summary |
|
|
References | () https://github.com/pwndoc/pwndoc/security/advisories/GHSA-ggqg-3f7v-c8rc - Exploit, Vendor Advisory |
10 Dec 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-10 23:15
Updated : 2025-04-18 17:35
NVD link : CVE-2024-55653
Mitre link : CVE-2024-55653
CVE.ORG link : CVE-2024-55653
JSON object : View
Products Affected
pwndoc_project
- pwndoc
CWE