Unrated severityNVD Advisory· Published Feb 28, 2025· Updated Mar 4, 2025
PwnDoc Arbitrary File Write to RCE using Path Traversal in backup restore as admin
CVE-2025-27410
Description
PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included .js file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the backups:create and backups:update (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue.
Affected products
1- Range: < 1.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/pwndoc/pwndoc/blob/14acb704891245bf1703ce6296d62112e85aa995/backend/src/routes/backup.jsmitrex_refsource_MISC
- github.com/pwndoc/pwndoc/commit/98f284291d73d3a0b11d3181d845845c192d1080mitrex_refsource_MISC
- github.com/pwndoc/pwndoc/releases/tag/v1.2.0mitrex_refsource_MISC
- github.com/pwndoc/pwndoc/security/advisories/GHSA-mxw8-vgvx-89hxmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.