Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU4MjItcHc1Ny12djM3

XSS vulnerability when listing users on add & modify server pages.

Impact

An XSS vulnerability exists in versions of Pterodactyl Panel before 0.7.19. Affected versions do not properly sanitize account names before rendering them to the dropdown selector in the admin area when creating or modifying a server.

Patches

This XSS has been addressed in 0.7.19 and will be rolled forwards into the 1.0-rc.7 release.

Workarounds

No workaround exists without manual patching. See https://github.com/pterodactyl/panel/pull/2441/files for the files changed.

For more information

If you have any questions or comments about this advisory please reach out on Discord, or by emailing dane at pterodactyl dot io.

Thank you to Sergej for the responsible disclosure of this issue.

Permalink: https://github.com/advisories/GHSA-5822-pw57-vv37
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU4MjItcHc1Ny12djM3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 3 years ago
Updated: about 1 year ago


Identifiers: GHSA-5822-pw57-vv37
References: Repository: https://github.com/pterodactyl/panel

Affected Packages

packagist:pterodactyl/panel
Dependent packages: 0
Dependent repositories: 0
Downloads: 95 total
Affected Version Ranges: >= 1.0.0-rc.0, <= 1.0.0-rc.6, < 0.7.19
Fixed in: 1.0.0-rc.7, 0.7.19
All affected versions: 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.5.4, 0.5.5, 0.5.6, 0.5.7, 0.6.0, 0.6.1, 0.6.2, 0.6.3, 0.6.4, 0.7.0, 0.7.1, 0.7.2, 0.7.3, 0.7.4, 0.7.5, 0.7.6, 0.7.7, 0.7.8, 0.7.9, 0.7.10, 0.7.11, 0.7.12, 0.7.13, 0.7.14, 0.7.15, 0.7.16, 0.7.17, 0.7.18, 1.0.0-rc.1, 1.0.0-rc.2, 1.0.0-rc.3, 1.0.0-rc.4, 1.0.0-rc.5, 1.0.0-rc.6
All unaffected versions: 0.7.19, 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.2.0, 1.2.1, 1.2.2, 1.3.0, 1.3.1, 1.3.2, 1.4.0, 1.4.1, 1.4.2, 1.5.0, 1.5.1, 1.6.0, 1.6.1, 1.6.2, 1.6.3, 1.6.5, 1.6.6, 1.7.0, 1.8.0, 1.8.1, 1.9.0, 1.9.1, 1.9.2, 1.10.0, 1.10.1, 1.10.2, 1.10.3, 1.10.4, 1.11.0, 1.11.1, 1.11.2, 1.11.3, 1.11.4, 1.11.5