Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1ncW1mLWpxZ3Ytdjhmd84AA7v4
Pterodactyl Wings vulnerable to Arbitrary File Write/Read
Impact
If the Wings token is leaked either by viewing the node configuration or posting it accidentally somewhere, an attacker can use it to gain arbitrary file write and read access on the node the token is associated to.
Workarounds
Enabling the ignore_panel_config_updates
option or updating to the latest version of Wings are the only known workarounds.
Patches
https://github.com/pterodactyl/wings/commit/5415f8ae07f533623bd8169836dd7e0b933964de
Permalink: https://github.com/advisories/GHSA-gqmf-jqgv-v8fwJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1ncW1mLWpxZ3Ytdjhmd84AA7v4
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 7 months ago
Updated: 7 months ago
CVSS Score: 8.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Identifiers: GHSA-gqmf-jqgv-v8fw, CVE-2024-34066
References:
- https://github.com/pterodactyl/wings/security/advisories/GHSA-gqmf-jqgv-v8fw
- https://nvd.nist.gov/vuln/detail/CVE-2024-34066
- https://github.com/pterodactyl/wings/commit/5415f8ae07f533623bd8169836dd7e0b933964de
- https://github.com/advisories/GHSA-gqmf-jqgv-v8fw
Blast Radius: 2.6
Affected Packages
go:github.com/pterodactyl/wings
Dependent packages: 0Dependent repositories: 2
Downloads:
Affected Version Ranges: < 1.11.12
Fixed in: 1.11.12
All affected versions: 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.3.0, 1.3.1, 1.3.2, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.4.5, 1.4.6, 1.4.7, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.5.5, 1.5.6, 1.6.0, 1.6.1, 1.6.2, 1.6.3, 1.6.4, 1.7.0, 1.7.1, 1.7.2, 1.7.3, 1.7.4, 1.7.5, 1.11.0, 1.11.1, 1.11.2, 1.11.3, 1.11.4, 1.11.5, 1.11.6, 1.11.7, 1.11.8, 1.11.9, 1.11.10, 1.11.11
All unaffected versions: 1.11.12, 1.11.13