Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rgmp-4873-r683

Опубликовано: 06 янв. 2026
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

Pterodactyl TOTPs can be reused during validity window

Summary

When a user signs into an account with 2FA enabled they are prompted to enter a token. When that token is used, it is not sufficiently marked as used in the system allowing an attacker that intercepts that token to then use it in addition to a known username/password during the token validity window.

This vulnerability requires that an attacker already be in possession of a valid username and password combination, and intercept a valid 2FA token (for example, during a screen share). The token must then be provided in addition to the username and password during the limited token validity window. The validity window is ~60 seconds as the Panel allows at most one additional window to the current one, each window being 30 seconds.

Пакеты

Наименование

pterodactyl/panel

composer
Затронутые версииВерсия исправления

< 1.12.0

1.12.0

EPSS

Процентиль: 9%
0.00031
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 6.5
nvd
около 1 месяца назад

Pterodactyl is a free, open-source game server management panel. Versions 1.11.11 and below allow TOTP to be used multiple times during its validity window. Users with 2FA enabled are prompted to enter a token during sign-in, and afterward it is not sufficiently marked as used in the system. This allows an attacker who intercepts that token to use it in addition to a known username/password during the 60-second token validity window. The attacker must have intercepted a valid 2FA token (for example, during a screen share). This issue is fixed in version 1.12.0.

EPSS

Процентиль: 9%
0.00031
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-287