CVE-2024-34066: Pterodactyl Wings vulnerable to Arbitrary File Write/Read
8.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.48117%
CWE
Published
5/3/2024
Updated
5/3/2024
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/pterodactyl/wings | go | < 1.11.12 | 1.11.12 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from exposed configuration fields in struct definitions (not specific functions) that allowed programmatic updates via API when deserializing JSON input. The commit adds json:"-" tags to sensitive fields in configuration structs (ApiConfiguration.DisableRemoteDownload, SystemConfiguration fields, Configuration.PanelLocation) to prevent serialization/deserialization. While these structs are used by configuration handling logic, the vulnerability manifests at the data structure/API interaction layer rather than specific function implementations. No concrete functions handling the deserialization or config updates are shown in the provided diff to analyze directly.