CVE-2025-27410 - PwnDoc Path Traversal Remote Code Execution

CVE ID : CVE-2025-27410 Published : Feb. 28, 2025, 9:15 p.m. | 1 hour, 44 minutes ago Description : PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue. Severity: 6.5 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

Mär 1, 2025 - 00:00
 0  0
CVE-2025-27410 - PwnDoc Path Traversal Remote Code Execution
CVE ID : CVE-2025-27410
Published : Feb. 28, 2025, 9:15 p.m. | 1 hour, 44 minutes ago
Description : PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue.
Severity: 6.5 | MEDIUM
Visit the link for more details, such as CVSS details, affected products, timeline, and more...