CVE-2025-27410
PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue.
Vendor
Product
CWE
Yayın Tarihi
2025-02-28 21:15:27
Güncelleme
2025-04-16 13:04:55
Source Identifier
security-advisories@github.com
KEV Date Added
-
Kategoriler
Referanslar
https://github.com/pwndoc/pwndoc/blob/14acb704891245bf1703ce6296d62112e85aa995/backend/src/routes/backup.js#L527
https://github.com/pwndoc/pwndoc/commit/98f284291d73d3a0b11d3181d845845c192d1080
https://github.com/pwndoc/pwndoc/releases/tag/v1.2.0
https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx
https://github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hx