CVE-2023-32080 – Wings vulnerable to escape to host from installation container
https://notcve.org/view.php?id=CVE-2023-32080
Wings is the server control plane for Pterodactyl Panel. A vulnerability affecting versions prior to 1.7.5 and versions 1.11.0 prior to 1.11.6 impacts anyone running the affected versions of Wings. This vulnerability can be used to gain access to the host system running Wings if a user is able to modify an server's install script or the install script executes code supplied by the user (either through environment variables, or commands that execute commands based off of user data). This vulnerability has been resolved in version `v1.11.6` of Wings, and has been back-ported to the 1.7 release series in `v1.7.5`. Anyone running `v1.11.x` should upgrade to `v1.11.6` and anyone running `v1.7.x` should upgrade to `v1.7.5`. There are no workarounds aside from upgrading. • https://github.com/pterodactyl/wings/releases/tag/v1.11.6 https://github.com/pterodactyl/wings/releases/tag/v1.17.5 https://github.com/pterodactyl/wings/security/advisories/GHSA-p744-4q6p-hvc2 • CWE-250: Execution with Unnecessary Privileges •
CVE-2023-25168 – Symbolic Link (Symlink) Following allowing the deletion of files and directories on the host system in wings
https://notcve.org/view.php?id=CVE-2023-25168
Wings is Pterodactyl's server control plane. This vulnerability can be used to delete files and directories recursively on the host system. This vulnerability can be combined with `GHSA-p8r3-83r8-jwj5` to overwrite files on the host system. In order to use this exploit, an attacker must have an existing "server" allocated and controlled by Wings. This vulnerability has been resolved in version `v1.11.4` of Wings, and has been back-ported to the 1.7 release series in `v1.7.4`. • https://github.com/pterodactyl/wings/commit/429ac62dba22997a278bc709df5ac00a5a25d83d https://github.com/pterodactyl/wings/security/advisories/GHSA-66p8-j459-rq63 https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2023-25152 – Symbolic Link (Symlink) Following in github.com/pterodactyl/wings
https://notcve.org/view.php?id=CVE-2023-25152
Wings is Pterodactyl's server control plane. Affected versions are subject to a vulnerability which can be used to create new files and directory structures on the host system that previously did not exist, potentially allowing attackers to change their resource allocations, promote their containers to privileged mode, or potentially add ssh authorized keys to allow the attacker access to a remote shell on the target machine. In order to use this exploit, an attacker must have an existing "server" allocated and controlled by the Wings Daemon. This vulnerability has been resolved in version `v1.11.3` of the Wings Daemon, and has been back-ported to the 1.7 release series in `v1.7.3`. Anyone running `v1.11.x` should upgrade to `v1.11.3` and anyone running `v1.7.x` should upgrade to `v1.7.3`. • https://github.com/pterodactyl/wings/commit/dac9685298c3c1c49b3109fa4241aa88272b9f14 https://github.com/pterodactyl/wings/security/advisories/GHSA-p8r3-83r8-jwj5 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2021-41273 – Cross-Site Request Forgery allowing sending of test emails and generation of node auto-deployment keys
https://notcve.org/view.php?id=CVE-2021-41273
Pterodactyl is an open-source game server management panel built with PHP 7, React, and Go. Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints: Sending a test email and Generating a node auto-deployment token. At no point would any data be exposed to the malicious user, this would simply trigger email spam to an administrative user, or generate a single auto-deployment token unexpectedly. This token is not revealed to the malicious user, it is simply created unexpectedly in the system. This has been addressed in release `1.6.6`. • https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5 https://github.com/pterodactyl/panel/security/advisories/GHSA-wwgq-9jhf-qgw6 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2021-41176 – logout CSRF in Pterodactyl Panel
https://notcve.org/view.php?id=CVE-2021-41176
Pterodactyl is an open-source game server management panel built with PHP 7, React, and Go. In affected versions of Pterodactyl a malicious user can trigger a user logout if a signed in user visits a malicious website that makes a request to the Panel's sign-out endpoint. This requires a targeted attack against a specific Panel instance, and serves only to sign a user out. **No user details are leaked, nor is any user data affected, this is simply an annoyance at worst.** This is fixed in version 1.6.3. Pterodactyl es un panel de administración de servidores de juegos de código abierto construido con PHP 7, React y Go. • https://github.com/pterodactyl/panel/commit/45999ba4ee1b2dcb12b4a2fa2cedfb6b5d66fac2 https://github.com/pterodactyl/panel/releases/tag/v1.6.3 https://github.com/pterodactyl/panel/security/advisories/GHSA-m49f-hcxp-6hm6 • CWE-352: Cross-Site Request Forgery (CSRF) •