Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-41129

Опубликовано: 06 окт. 2021
Источник: nvd
CVSS3: 8.1
CVSS2: 6.8
EPSS Низкий

Описание

Pterodactyl is an open-source game server management panel built with PHP 7, React, and Go. A malicious user can modify the contents of a confirmation_token input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account with two-factor authentication enabled, and then must provide a correct two-factor authentication token before being authenticated as that user. Due to a validation flaw in the logic handling user authentication during the two-factor authentication process a malicious user can trick the system into loading credentials for an arbitrary user by modifying the token sent to the server. This authentication flaw is present in the LoginCheckpointController@__invoke method which handles two-factor authentication for a user. This controller looks for a request input parameter called `conf

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:pterodactyl:panel:*:*:*:*:*:*:*:*
Версия от 1.0.0 (включая) до 1.6.2 (исключая)

EPSS

Процентиль: 41%
0.00193
Низкий

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-502
CWE-287

Связанные уязвимости

CVSS3: 8.1
github
больше 4 лет назад

Pterodactyl Panel vulnerable to authentication bypass due to improper user-provided security token verification

EPSS

Процентиль: 41%
0.00193
Низкий

8.1 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-502
CWE-287