Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Symbolic Link (Symlink) Following in github.com/pterodactyl/wings
Vulnerability Description
Wings is Pterodactyl's server control plane. Affected versions are subject to a vulnerability which can be used to create new files and directory structures on the host system that previously did not exist, potentially allowing attackers to change their resource allocations, promote their containers to privileged mode, or potentially add ssh authorized keys to allow the attacker access to a remote shell on the target machine. In order to use this exploit, an attacker must have an existing "server" allocated and controlled by the Wings Daemon. This vulnerability has been resolved in version `v1.11.3` of the Wings Daemon, and has been back-ported to the 1.7 release series in `v1.7.3`. Anyone running `v1.11.x` should upgrade to `v1.11.3` and anyone running `v1.7.x` should upgrade to `v1.7.3`. There are no known workarounds for this vulnerability. ### Workarounds None at this time.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:H
Vulnerability Type
在文件访问前对链接解析不恰当(链接跟随)
Vulnerability Title
Wings 后置链接漏洞
Vulnerability Description
Wings是Pterodactyl Panel 的服务器控制界面。 Wings v1.7.3版本之前的v1.7.x版本、v1.11.3之前版本的v1.11.x版本存在后置链接漏洞,该漏洞源于可以在主机系统上创建以前不存在的新文件和目录结构,可能允许攻击者更改其资源分配,将其容器提升为特权模式。
CVSS Information
N/A
Vulnerability Type
N/A