logo

CVE-2024-34066 github.com/pterodactyl/wings

Package

Manager: go
Name: github.com/pterodactyl/wings
Vulnerable Version: >=0 <1.11.12

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.00249 pctl0.48027

Details

Pterodactyl Wings vulnerable to Arbitrary File Write/Read ### Impact If the Wings token is leaked either by viewing the node configuration or posting it accidentally somewhere, an attacker can use it to gain arbitrary file write and read access on the node the token is associated to. ### Workarounds Enabling the `ignore_panel_config_updates` option or updating to the latest version of Wings are the only known workarounds. ### Patches https://github.com/pterodactyl/wings/commit/5415f8ae07f533623bd8169836dd7e0b933964de

Metadata

Created: 2024-05-03T20:28:10Z
Modified: 2024-05-03T20:28:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-gqmf-jqgv-v8fw/GHSA-gqmf-jqgv-v8fw.json
CWE IDs: ["CWE-552"]
Alternative ID: GHSA-gqmf-jqgv-v8fw
Finding: F123
Auto approve: 1