PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality allows an administrator to import raw data into the database, including Path Traversal (`../`) sequences. This is problematic for the template update functionality as it uses the path from the database to write arbitrary content to, potentially overwriting source code to achieve Remote Code Execution. Any user with the `backups:create`, `backups:update` and `templates:update` permissions (only administrators by default) can write arbitrary content to anywhere on the filesystem. By overwriting source code, it is possible to achieve Remote Code Execution. Version 1.2.0 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 15 Apr 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Pwndoc Project
Pwndoc Project pwndoc |
|
CPEs | cpe:2.3:a:pwndoc_project:pwndoc:*:*:*:*:*:*:*:* | |
Vendors & Products |
Pwndoc Project
Pwndoc Project pwndoc |
Tue, 04 Mar 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 28 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality allows an administrator to import raw data into the database, including Path Traversal (`../`) sequences. This is problematic for the template update functionality as it uses the path from the database to write arbitrary content to, potentially overwriting source code to achieve Remote Code Execution. Any user with the `backups:create`, `backups:update` and `templates:update` permissions (only administrators by default) can write arbitrary content to anywhere on the filesystem. By overwriting source code, it is possible to achieve Remote Code Execution. Version 1.2.0 fixes the issue. | |
Title | PwnDoc Arbitrary File Write to RCE using Path Traversal in template update from backup templates.json | |
Weaknesses | CWE-22 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-04T20:09:20.769Z
Reserved: 2025-02-24T15:51:17.268Z
Link: CVE-2025-27413

Updated: 2025-03-04T20:09:09.898Z

Status : Analyzed
Published: 2025-02-28T21:15:27.820
Modified: 2025-04-15T20:27:24.010
Link: CVE-2025-27413

No data.