CVE-2024-34068 – github.com/pterodactyl/wings
Package
Manager: go
Name: github.com/pterodactyl/wings
Vulnerable Version: >=0 <1.11.12
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
EPSS: 0.00174 pctl0.39209
Details
Pterodactyl Wings vulnerable to Server-Side Request Forgery during remote file pull ### Impact An authenticated user who has access to a game server is able to bypass the previously implemented access control (https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv) that prevents accessing internal endpoints of the node hosting Wings in the pull endpoint. This would allow malicious users to potentially access resources on local networks that would otherwise be inaccessible. ### Workarounds Enabling the `api.disable_remote_download` option or updating to the latest version of Wings are the only known workarounds. ### Patches https://github.com/pterodactyl/wings/commit/c152e36101aba45d8868a9a0eeb890995e8934b8
Metadata
Created: 2024-05-03T20:29:59Z
Modified: 2025-02-21T16:11:49Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-qq22-jj8x-4wwv/GHSA-qq22-jj8x-4wwv.json
CWE IDs: ["CWE-284", "CWE-441", "CWE-918"]
Alternative ID: GHSA-qq22-jj8x-4wwv
Finding: F100
Auto approve: 1