PenDoc is a penetration testing reporting application. Prior to commit 1d4219c596f4f518798492e48386a20c6e9a2fe6, an attacker can write a malicious docx template containing expressions that escape the JavaScript sandbox to execute arbitrary code on the system. An attacker who can control the contents of the template document is able to execute arbitrary code on the system. By default, only users with the `admin` role are able to create or update templates. Commit 1d4219c596f4f518798492e48386a20c6e9a2fe6 patches the issue.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Dec 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | PenDoc is a penetration testing reporting application. Prior to commit 1d4219c596f4f518798492e48386a20c6e9a2fe6, an attacker can write a malicious docx template containing expressions that escape the JavaScript sandbox to execute arbitrary code on the system. An attacker who can control the contents of the template document is able to execute arbitrary code on the system. By default, only users with the `admin` role are able to create or update templates. Commit 1d4219c596f4f518798492e48386a20c6e9a2fe6 patches the issue. | |
Title | PwnDoc Server-Side Template Injection vulnerability - Sandbox Escape to RCE using custom filters | |
Weaknesses | CWE-1336 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-12-12T16:32:39.666Z
Reserved: 2024-12-10T14:47:08.666Z
Link: CVE-2024-55652

Updated: 2024-12-12T16:32:16.749Z

Status : Awaiting Analysis
Published: 2024-12-12T02:15:32.377
Modified: 2024-12-12T17:15:11.360
Link: CVE-2024-55652

No data.