CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
AI Score
Confidence
Low
EPSS
Percentile
15.5%
An authenticated user who has access to a game server is able to bypass the previously implemented access control (https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv) that prevents accessing internal endpoints of the node hosting Wings in the pull endpoint. This would allow malicious users to potentially access resources on local networks that would otherwise be inaccessible.
Enabling the api.disable_remote_download
option or updating to the latest version of Wings are the only known workarounds.
https://github.com/pterodactyl/wings/commit/c152e36101aba45d8868a9a0eeb890995e8934b8
Vendor | Product | Version | CPE |
---|---|---|---|
pterodactyl | wings | * | cpe:2.3:a:pterodactyl:wings:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-qq22-jj8x-4wwv
github.com/pterodactyl/wings/commit/c152e36101aba45d8868a9a0eeb890995e8934b8
github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv
github.com/pterodactyl/wings/security/advisories/GHSA-qq22-jj8x-4wwv
nvd.nist.gov/vuln/detail/CVE-2024-34068
pkg.go.dev/vuln/GO-2024-2815