PwnDoc is a penetration test report generator. There is no CSRF protection in pwndoc, allowing attackers to send requests on a logged-in user's behalf. This includes GET and POST requests due to the missing SameSite= attribute on cookies and the ability to refresh cookies. Commit 14acb704891245bf1703ce6296d62112e85aa995 patches the issue.
References
Link | Resource |
---|---|
https://github.com/pwndoc/pwndoc/commit/14acb704891245bf1703ce6296d62112e85aa995 | Patch |
https://github.com/pwndoc/pwndoc/security/advisories/GHSA-9v2v-jxvw-52rq | Exploit Vendor Advisory |
Configurations
History
07 May 2025, 18:59
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/pwndoc/pwndoc/commit/14acb704891245bf1703ce6296d62112e85aa995 - Patch | |
References | () https://github.com/pwndoc/pwndoc/security/advisories/GHSA-9v2v-jxvw-52rq - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:pwndoc_project:pwndoc:*:*:*:*:*:*:*:* | |
First Time |
Pwndoc Project pwndoc
Pwndoc Project |
20 Jan 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-20 16:15
Updated : 2025-05-07 18:59
NVD link : CVE-2025-23044
Mitre link : CVE-2025-23044
CVE.ORG link : CVE-2025-23044
JSON object : View
Products Affected
pwndoc_project
- pwndoc
CWE
CWE-352
Cross-Site Request Forgery (CSRF)