PwnDoc is a penetration test report generator. There is no CSRF protection in pwndoc, allowing attackers to send requests on a logged-in user's behalf. This includes GET and POST requests due to the missing SameSite= attribute on cookies and the ability to refresh cookies. Commit 14acb704891245bf1703ce6296d62112e85aa995 patches the issue.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://github.com/pwndoc/pwndoc/security/advisories/GHSA-9v2v-jxvw-52rq | vendor advisory exploit |
https://github.com/pwndoc/pwndoc/commit/14acb704891245bf1703ce6296d62112e85aa995 | patch |