GHSA-gqmf-jqgv-v8fw

Source
https://github.com/advisories/GHSA-gqmf-jqgv-v8fw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/05/GHSA-gqmf-jqgv-v8fw/GHSA-gqmf-jqgv-v8fw.json
Aliases
Published
2024-05-03T20:28:10Z
Modified
2024-05-03T20:43:32.757245Z
Summary
Pterodactyl Wings vulnerable to Arbitrary File Write/Read
Details

Impact

If the Wings token is leaked either by viewing the node configuration or posting it accidentally somewhere, an attacker can use it to gain arbitrary file write and read access on the node the token is associated to.

Workarounds

Enabling the ignore_panel_config_updates option or updating to the latest version of Wings are the only known workarounds.

Patches

https://github.com/pterodactyl/wings/commit/5415f8ae07f533623bd8169836dd7e0b933964de

References

Affected packages

Go / github.com/pterodactyl/wings

Affected ranges

Type
SEMVER
Events
Introduced
0The exact introduced commit is unknown
Fixed
1.11.12