Description
PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality allows an administrator to import raw data into the database, including Path Traversal (`../`) sequences. This is problematic for the template update functionality as it uses the path from the database to write arbitrary content to, potentially overwriting source code to achieve Remote Code Execution. Any user with the `backups:create`, `backups:update` and `templates:update` permissions (only administrators by default) can write arbitrary content to anywhere on the filesystem. By overwriting source code, it is possible to achieve Remote Code Execution. Version 1.2.0 fixes the issue.
INFO
Published Date :
2025-02-28T21:02:35.656Z
Last Modified :
2025-03-04T20:09:20.769Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-27413 vulnerability.
| Vendors | Products |
|---|---|
| Pwndoc Project |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-27413.