Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fg52-xjfc-9rh8

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Pterodactyl vulnerable to 2FA Sniffing

Pterodactyl version 0.7.13 and lower - 2FA Sniffing

Users who have enabled 2FA protections on their account can unintentionally have their account's existence sniffed by malicious users who enter random credentials into the login fields.

Impact

Users who have enabled 2FA protections on their account can unintentionally have their account's existence sniffed by malicious users who enter random credentials into the login fields.

A logical mistake was made when the original code was written that would wait to verify the user's password until they had provided 2FA credentials if it was enabled on their account. However, because of this you could enter a bad password for a known email and determine if the account exists if you got redirected to a 2FA page.

For more information

If you have any questions or comments about this advisory please react out on Discord or email dane@[project name].io.

Пакеты

Наименование

pterodactyl/panel

composer
Затронутые версииВерсия исправления

<= 0.7.13

0.7.14

EPSS

Процентиль: 54%
0.00316
Низкий

7.5 High

CVSS3

Дефекты

CWE-203

Связанные уязвимости

CVSS3: 7.5
nvd
больше 6 лет назад

Pterodactyl before 0.7.14 with 2FA allows credential sniffing.

EPSS

Процентиль: 54%
0.00316
Низкий

7.5 High

CVSS3

Дефекты

CWE-203