logo

CVE-2021-41176 pterodactyl/panel

Package

Manager: composer
Name: pterodactyl/panel
Vulnerable Version: >=1.0.0 <1.6.3

Severity

Level: Low

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00168 pctl0.38392

Details

pterodactyl/panel CSRF allowing an external page to trigger a user logout event ### Impact A malicious user can trigger a user logout if a signed in user visits a malicious website that makes a request to the Panel's sign-out endpoint. This requires a targeted attack against a specific Panel instance, and serves only to sign a user out. **No user details are leaked, nor is any user data affected, this is simply an annoyance at worst.** ### Patches None. ### Workarounds None. ### For more information If you have any questions or comments about this advisory please contact `Tactical Fish#8008` on Discord, or email `dane@pterodactyl.io`.

Metadata

Created: 2021-10-25T19:42:46Z
Modified: 2023-09-20T19:07:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/10/GHSA-m49f-hcxp-6hm6/GHSA-m49f-hcxp-6hm6.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-m49f-hcxp-6hm6
Finding: F007
Auto approve: 1