PenDoc is a penetration testing reporting application. Prior to commit 1d4219c596f4f518798492e48386a20c6e9a2fe6, an attacker can write a malicious docx template containing expressions that escape the JavaScript sandbox to execute arbitrary code on the system. An attacker who can control the contents of the template document is able to execute arbitrary code on the system. By default, only users with the `admin` role are able to create or update templates. Commit 1d4219c596f4f518798492e48386a20c6e9a2fe6 patches the issue.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Dec 2024 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PenDoc is a penetration testing reporting application. Prior to commit 1d4219c596f4f518798492e48386a20c6e9a2fe6, an attacker can write a malicious docx template containing expressions that escape the JavaScript sandbox to execute arbitrary code on the system. An attacker who can control the contents of the template document is able to execute arbitrary code on the system. By default, only users with the `admin` role are able to create or update templates. Commit 1d4219c596f4f518798492e48386a20c6e9a2fe6 patches the issue. | |
| Title | PwnDoc Server-Side Template Injection vulnerability - Sandbox Escape to RCE using custom filters | |
| Weaknesses | CWE-1336 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-12-11T22:41:16.664Z
Updated: 2024-12-12T16:32:39.666Z
Reserved: 2024-12-10T14:47:08.666Z
Link: CVE-2024-55652
Updated: 2024-12-12T16:32:16.749Z
Status : Awaiting Analysis
Published: 2024-12-12T02:15:32.377
Modified: 2024-12-12T17:15:11.360
Link: CVE-2024-55652
No data.