blob: 446b2392ab14f090dac56d808902639d8da2d04e [file] [log] [blame]
id: GO-TEST-ID
modules:
- module: github.com/pterodactyl/wings
versions:
- introduced: 1.2.0
fixed: 1.2.1
vulnerable_at: 1.2.0
summary: |-
Unchecked hostname resolution could allow access to local network resources by
users outside the local network
description: |-
### Impact A newly implemented route allowing users to download files from
remote endpoints was not properly verifying the destination hostname for user
provided URLs. This would allow malicious users to potentially access resources
on local networks that would otherwise be inaccessible.
This vulnerability requires valid authentication credentials and is therefore
**not exploitable by unauthenticated users**. If you are running an instance for
yourself or other trusted individuals this impact is unlikely to be of major
concern to you. However, you should still upgrade for security sake.
### Patches Users should upgrade to the latest version of Wings.
### Workarounds There is no workaround available that does not involve modifying
Panel or Wings code.
ghsas:
- GHSA-6rg3-8h8x-5xfv
references:
- advisory: https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv
notes:
- lint: 'description: possible markdown formatting (found ### )'
- lint: 'summary: must contain an affected module or package path (e.g. "github.com/pterodactyl/wings")'
- lint: 'summary: too long (found 110 characters, want <=100)'