Логотип exploitDog
bind:CVE-2021-41129
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-41129

Количество 2

Количество 2

nvd логотип

CVE-2021-41129

больше 4 лет назад

Pterodactyl is an open-source game server management panel built with PHP 7, React, and Go. A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account with two-factor authentication enabled, and then must provide a correct two-factor authentication token before being authenticated as that user. Due to a validation flaw in the logic handling user authentication during the two-factor authentication process a malicious user can trick the system into loading credentials for an arbitrary user by modifying the token sent to the server. This authentication flaw is present in the `LoginCheckpointController@__invoke` method which handles two-factor authentication for a user. This controller looks for a request input parameter called `conf

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-5vfx-8w6m-h3v4

больше 4 лет назад

Pterodactyl Panel vulnerable to authentication bypass due to improper user-provided security token verification

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-41129

Pterodactyl is an open-source game server management panel built with PHP 7, React, and Go. A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account with two-factor authentication enabled, and then must provide a correct two-factor authentication token before being authenticated as that user. Due to a validation flaw in the logic handling user authentication during the two-factor authentication process a malicious user can trick the system into loading credentials for an arbitrary user by modifying the token sent to the server. This authentication flaw is present in the `LoginCheckpointController@__invoke` method which handles two-factor authentication for a user. This controller looks for a request input parameter called `conf

CVSS3: 8.1
0%
Низкий
больше 4 лет назад
github логотип
GHSA-5vfx-8w6m-h3v4

Pterodactyl Panel vulnerable to authentication bypass due to improper user-provided security token verification

CVSS3: 8.1
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу