PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality allows an administrator to import raw data into the database, including Path Traversal (`../`) sequences. This is problematic for the template update functionality as it uses the path from the database to write arbitrary content to, potentially overwriting source code to achieve Remote Code Execution. Any user with the `backups:create`, `backups:update` and `templates:update` permissions (only administrators by default) can write arbitrary content to anywhere on the filesystem. By overwriting source code, it is possible to achieve Remote Code Execution. Version 1.2.0 fixes the issue.
History

Tue, 15 Apr 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Pwndoc Project
Pwndoc Project pwndoc
CPEs cpe:2.3:a:pwndoc_project:pwndoc:*:*:*:*:*:*:*:*
Vendors & Products Pwndoc Project
Pwndoc Project pwndoc

Tue, 04 Mar 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 28 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Description PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality allows an administrator to import raw data into the database, including Path Traversal (`../`) sequences. This is problematic for the template update functionality as it uses the path from the database to write arbitrary content to, potentially overwriting source code to achieve Remote Code Execution. Any user with the `backups:create`, `backups:update` and `templates:update` permissions (only administrators by default) can write arbitrary content to anywhere on the filesystem. By overwriting source code, it is possible to achieve Remote Code Execution. Version 1.2.0 fixes the issue.
Title PwnDoc Arbitrary File Write to RCE using Path Traversal in template update from backup templates.json
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-03-04T20:09:20.769Z

Reserved: 2025-02-24T15:51:17.268Z

Link: CVE-2025-27413

cve-icon Vulnrichment

Updated: 2025-03-04T20:09:09.898Z

cve-icon NVD

Status : Analyzed

Published: 2025-02-28T21:15:27.820

Modified: 2025-04-15T20:27:24.010

Link: CVE-2025-27413

cve-icon Redhat

No data.