PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Mar 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 28 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue. | |
Title | PwnDoc Arbitrary File Write to RCE using Path Traversal in backup restore as admin | |
Weaknesses | CWE-22 CWE-23 |
|
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-02-28T21:00:11.328Z
Updated: 2025-03-04T20:31:01.435Z
Reserved: 2025-02-24T15:51:17.268Z
Link: CVE-2025-27410

Updated: 2025-03-04T20:30:51.942Z

Status : Awaiting Analysis
Published: 2025-02-28T21:15:27.677
Modified: 2025-03-04T21:15:14.197
Link: CVE-2025-27410

No data.