PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue.
References
Configurations
History
15 Apr 2025, 20:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
Pwndoc Project pwndoc
Pwndoc Project |
|
CPE | cpe:2.3:a:pwndoc_project:pwndoc:*:*:*:*:*:*:*:* | |
References | () https://github.com/pwndoc/pwndoc/blob/14acb704891245bf1703ce6296d62112e85aa995/backend/src/routes/backup.js#L527 - Product | |
References | () https://github.com/pwndoc/pwndoc/commit/98f284291d73d3a0b11d3181d845845c192d1080 - Patch | |
References | () https://github.com/pwndoc/pwndoc/releases/tag/v1.2.0 - Release Notes | |
References | () https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx - Exploit, Vendor Advisory |
04 Mar 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx - | |
Summary |
|
28 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-28 21:15
Updated : 2025-04-16 13:04
NVD link : CVE-2025-27410
Mitre link : CVE-2025-27410
CVE.ORG link : CVE-2025-27410
JSON object : View
Products Affected
pwndoc_project
- pwndoc