Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jw2v-cq5x-q68g

Опубликовано: 20 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 6
CVSS3: 6.5

Описание

Pterodactyl improperly locks resources allowing raced queries to create more resources than alloted

Summary

Pterodactyl implements rate limits that are applied to the total number of resources (e.g. databases, port allocations, or backups) that can exist for an individual server. These resource limits are applied on a per-server basis, and validated during the request cycle.

However, it is possible for a malicious user to send a massive volume of requests at the same time that would create more resources than the server is allotted. This is because the validation occurs early in the request cycle and does not lock the target resource while it is processing. As a result sending a large volume of requests at the same time would lead all of those requests to validate as not using any of the target resources, and then all creating the resources at the same time.

As a result a server would be able to create more databases, allocations, or backups than configured.

Impact

A malicious user is able to deny resources to other users on the system, and may be able to excessively consume the limited allocations for a node, or fill up backup space faster than is allowed by the system.

Пакеты

Наименование

pterodactyl/panel

composer
Затронутые версииВерсия исправления

< 1.12.0

1.12.0

EPSS

Процентиль: 11%
0.00038
Низкий

6 Medium

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-362
CWE-400
CWE-413
CWE-667

Связанные уязвимости

CVSS3: 6.5
nvd
19 дней назад

Pterodactyl is a free, open-source game server management panel. Pterodactyl implements rate limits that are applied to the total number of resources (e.g. databases, port allocations, or backups) that can exist for an individual server. These resource limits are applied on a per-server basis, and validated during the request cycle. However, in versions prior to 1.12.0, it is possible for a malicious user to send a massive volume of requests at the same time that would create more resources than the server is allotted. This is because the validation occurs early in the request cycle and does not lock the target resource while it is processing. As a result sending a large volume of requests at the same time would lead all of those requests to validate as not using any of the target resources, and then all creating the resources at the same time. As a result a server would be able to create more databases, allocations, or backups than configured. A malicious user is able to deny resource

EPSS

Процентиль: 11%
0.00038
Низкий

6 Medium

CVSS4

6.5 Medium

CVSS3

Дефекты

CWE-362
CWE-400
CWE-413
CWE-667