漏洞标题
利用管理员备份恢复中的路径遍历任意文件写入实现远程代码执行漏洞
漏洞描述信息
PwnDoc 是一款渗透测试报告应用。在 1.2.0 版本之前,备份恢复功能存在路径遍历漏洞,攻击者可以通过该漏洞覆盖系统上的任意文件。通过覆盖一个包含的 `.js` 文件并重启容器,可以实现以管理员权限的远程代码执行。远程代码执行的原因是,任何拥有 `backups:create` 和 `backups:update` 权限的用户(默认只有管理员拥有)能够覆盖系统上的任意文件。1.2.0 版本修复了该问题。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
漏洞类别
对路径名的限制不恰当(路径遍历)
漏洞标题
PwnDoc Arbitrary File Write to RCE using Path Traversal in backup restore as admin
漏洞描述信息
PwnDoc is a penetration test reporting application. Prior to version 1.2.0, the backup restore functionality is vulnerable to path traversal in the TAR entry's name, allowing an attacker to overwrite any file on the system with their content. By overwriting an included `.js` file and restarting the container, this allows for Remote Code Execution as an administrator. The remote code execution occurs because any user with the `backups:create` and `backups:update` (only administrators by default) is able to overwrite any file on the system. Version 1.2.0 fixes the issue.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
漏洞类别
相对路径遍历