Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qq22-jj8x-4wwv

Опубликовано: 03 мая 2024
Источник: github
Github: Прошло ревью
CVSS3: 6.4

Описание

Pterodactyl Wings vulnerable to Server-Side Request Forgery during remote file pull

Impact

An authenticated user who has access to a game server is able to bypass the previously implemented access control (https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv) that prevents accessing internal endpoints of the node hosting Wings in the pull endpoint. This would allow malicious users to potentially access resources on local networks that would otherwise be inaccessible.

Workarounds

Enabling the api.disable_remote_download option or updating to the latest version of Wings are the only known workarounds.

Patches

https://github.com/pterodactyl/wings/commit/c152e36101aba45d8868a9a0eeb890995e8934b8

Пакеты

Наименование

github.com/pterodactyl/wings

go
Затронутые версииВерсия исправления

< 1.11.12

1.11.12

EPSS

Процентиль: 47%
0.00237
Низкий

6.4 Medium

CVSS3

Дефекты

CWE-284
CWE-441
CWE-918

Связанные уязвимости

CVSS3: 6.4
nvd
почти 2 года назад

Pterodactyl wings is the server control plane for Pterodactyl Panel. An authenticated user who has access to a game server is able to bypass the previously implemented access control (GHSA-6rg3-8h8x-5xfv) that prevents accessing internal endpoints of the node hosting Wings in the pull endpoint. This would allow malicious users to potentially access resources on local networks that would otherwise be inaccessible. This issue has been addressed in version 1.11.2 and users are advised to upgrade. Users unable to upgrade may enable the `api.disable_remote_download` option as a workaround.

EPSS

Процентиль: 47%
0.00237
Низкий

6.4 Medium

CVSS3

Дефекты

CWE-284
CWE-441
CWE-918