CVE-2025-27413
PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality allows an administrator to import raw data into the database, including Path Traversal (`../`) sequences. This is problematic for the template update functionality as it uses the path from the database to write arbitrary content to, potentially overwriting source code to achieve Remote Code Execution. Any user with the `backups:create`, `backups:update` and `templates:update` permissions (only administrators by default) can write arbitrary content to anywhere on the filesystem. By overwriting source code, it is possible to achieve Remote Code Execution. Version 1.2.0 fixes the issue.
Vendor
Product
CWE
Yayın Tarihi
2025-02-28 21:15:27
Güncelleme
2025-04-15 20:27:24
Source Identifier
security-advisories@github.com
KEV Date Added
-
Kategoriler
Referanslar
https://github.com/pwndoc/pwndoc/blob/14acb704891245bf1703ce6296d62112e85aa995/backend/src/models/template.js#L170-L175
https://github.com/pwndoc/pwndoc/blob/14acb704891245bf1703ce6296d62112e85aa995/backend/src/routes/backup.js#L826-L827
https://github.com/pwndoc/pwndoc/blob/14acb704891245bf1703ce6296d62112e85aa995/backend/src/routes/template.js#L63-L66
https://github.com/pwndoc/pwndoc/commit/68aa1ea676a91e17bfb333a27571151bd07fb21d
https://github.com/pwndoc/pwndoc/releases/tag/v1.2.0
https://github.com/pwndoc/pwndoc/security/advisories/GHSA-r3vj-47cf-4672
https://github.com/pwndoc/pwndoc/security/advisories/GHSA-r3vj-47cf-4672