CVE Vulnerabilities

CVE-2023-25168

Improper Link Resolution Before File Access ('Link Following')

Published: Feb 09, 2023 | Modified: Nov 07, 2023
CVSS 3.x
8.2
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

Wings is Pterodactyls server control plane. This vulnerability can be used to delete files and directories recursively on the host system. This vulnerability can be combined with GHSA-p8r3-83r8-jwj5 to overwrite files on the host system. In order to use this exploit, an attacker must have an existing server allocated and controlled by Wings. This vulnerability has been resolved in version v1.11.4 of Wings, and has been back-ported to the 1.7 release series in v1.7.4. Anyone running v1.11.x should upgrade to v1.11.4 and anyone running v1.7.x should upgrade to v1.7.4. There are no known workarounds for this issue.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Wings Pterodactyl 1.7.0 (including) 1.7.4 (excluding)
Wings Pterodactyl 1.11.0 (including) 1.11.0 (including)
Wings Pterodactyl 1.11.1 (including) 1.11.1 (including)
Wings Pterodactyl 1.11.2 (including) 1.11.2 (including)
Wings Pterodactyl 1.11.3 (including) 1.11.3 (including)

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References