CVE-2023-25168

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-25168
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-25168.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-25168
Aliases
Related
Published
2023-02-09T00:16:36Z
Modified
2025-01-15T04:44:34.461576Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H CVSS Calculator
Summary
[none]
Details

Wings is Pterodactyl's server control plane. This vulnerability can be used to delete files and directories recursively on the host system. This vulnerability can be combined with GHSA-p8r3-83r8-jwj5 to overwrite files on the host system. In order to use this exploit, an attacker must have an existing "server" allocated and controlled by Wings. This vulnerability has been resolved in version v1.11.4 of Wings, and has been back-ported to the 1.7 release series in v1.7.4. Anyone running v1.11.x should upgrade to v1.11.4 and anyone running v1.7.x should upgrade to v1.7.4. There are no known workarounds for this issue.

References

Affected packages

Git / github.com/pterodactyl/wings

Affected ranges

Type
GIT
Repo
https://github.com/pterodactyl/wings
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v1.*

v1.0.0
v1.0.0-beta.9
v1.0.0-rc.1
v1.0.0-rc.2
v1.0.0-rc.3
v1.0.0-rc.4
v1.0.0-rc.5
v1.0.0-rc.6
v1.0.0-rc.7
v1.0.1
v1.1.0
v1.1.1
v1.1.2
v1.1.3
v1.11.0
v1.11.0-rc.1
v1.11.0-rc.2
v1.11.1
v1.11.2
v1.11.3
v1.2.0
v1.2.1
v1.2.2
v1.2.3
v1.3.0
v1.3.1
v1.3.2
v1.4.0
v1.4.1
v1.4.2
v1.4.3
v1.4.4
v1.4.5
v1.4.6
v1.4.7
v1.5.0
v1.5.1
v1.5.2
v1.5.3
v1.5.4
v1.5.5
v1.5.6
v1.6.0
v1.6.1
v1.6.2
v1.6.3
v1.6.4
v1.7.0
v1.7.1
v1.7.2