Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-27102
HistoryMar 13, 2024 - 8:28 p.m.

CVE-2024-27102 Improper isolation of server file access in github.com/pterodactyl/wings

2024-03-1320:28:07
CWE-22
CWE-362
CWE-363
GitHub_M
github.com
2
github wings
file access
vulnerability
pterodactyl
panel
exploitation
rewrite
update

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.5

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Wings is the server control plane for Pterodactyl Panel. This vulnerability impacts anyone running the affected versions of Wings. The vulnerability can potentially be used to access files and directories on the host system. The full scope of impact is exactly unknown, but reading files outside of a server’s base directory (sandbox root) is possible. In order to use this exploit, an attacker must have an existing “server” allocated and controlled by Wings. Details on the exploitation of this vulnerability are embargoed until March 27th, 2024 at 18:00 UTC. In order to mitigate this vulnerability, a full rewrite of the entire server filesystem was necessary. Because of this, the size of the patch is massive, however effort was made to reduce the amount of breaking changes. Users are advised to update to version 1.11.9. There are no known workarounds for this vulnerability.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:pterodactyl:wings:-:*:*:*:*:*:*:*"
    ],
    "vendor": "pterodactyl",
    "product": "wings",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "1.11.9",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

9.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

AI Score

9.5

Confidence

High

SSVC

Exploitation

poc

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-27102