cve/2024/CVE-2024-55653.md

18 lines
1.0 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-55653](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55653)
![](https://img.shields.io/static/v1?label=Product&message=pwndoc&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%3D%200.5.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%3A%20Improper%20Input%20Validation&color=brightgreen)
### Description
PwnDoc is a penetration test report generator. In versions up to and including 0.5.3, an authenticated user is able to crash the backend by raising a `UnhandledPromiseRejection` on audits which exits the backend. The user doesn't need to know the audit id, since a bad audit id will also raise the rejection. With the backend being unresponsive, the whole application becomes unusable for all users of the application. As of time of publication, no known patches are available.
### POC
#### Reference
- https://github.com/pwndoc/pwndoc/security/advisories/GHSA-ggqg-3f7v-c8rc
#### Github
No PoCs found on GitHub currently.