Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-34068
HistoryMay 03, 2024 - 5:34 p.m.

CVE-2024-34068 Server-side Request Forgery during remote file pull in Pterodactyl wings

2024-05-0317:34:16
CWE-441
CWE-284
GitHub_M
github.com
server-side request forgery
pterodactyl wings
access control bypass
internal endpoints
remote file pull
local networks
security patch
upgrade
workaround

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Pterodactyl wings is the server control plane for Pterodactyl Panel. An authenticated user who has access to a game server is able to bypass the previously implemented access control (GHSA-6rg3-8h8x-5xfv) that prevents accessing internal endpoints of the node hosting Wings in the pull endpoint. This would allow malicious users to potentially access resources on local networks that would otherwise be inaccessible. This issue has been addressed in version 1.11.2 and users are advised to upgrade. Users unable to upgrade may enable the api.disable_remote_download option as a workaround.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:pterodactyl:wings:-:*:*:*:*:*:*:*"
    ],
    "vendor": "pterodactyl",
    "product": "wings",
    "versions": [
      {
        "status": "affected",
        "version": "-",
        "lessThan": "1.11.12",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-34068