Miggo Logo

GHSA-6rg3-8h8x-5xfv: Unchecked hostname resolution could allow access to local network resources by users outside the local network

6.4

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
6/23/2021
Updated
1/9/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/pterodactyl/wingsgo= 1.2.01.2.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description indicates a missing hostname verification step in a file download route. While exact code isn't available, Go HTTP client patterns suggest the file download handler would: 1) Accept user-provided URLs, 2) Resolve hostnames, 3) Initiate transfers. The lack of IP validation after DNS resolution (to block private/rfc1918 addresses) would manifest in the download handler function. The medium confidence reflects educated guessing based on vulnerability patterns in Go web services, though without concrete code evidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t * n*wly impl*m*nt** rout* *llowin* us*rs to *ownlo** *il*s *rom r*mot* *n*points w*s not prop*rly v*ri*yin* t** **stin*tion *ostn*m* *or us*r provi*** URLs. T*is woul* *llow m*li*ious us*rs to pot*nti*lly ****ss r*sour**s on lo**l n*tworks

Reasoning

T** vuln*r**ility **s*ription in*i**t*s * missin* *ostn*m* v*ri*i**tion st*p in * *il* *ownlo** rout*. W*il* *x**t *o** isn't *v*il**l*, *o `*TTP` *li*nt p*tt*rns su***st t** *il* *ownlo** **n*l*r woul*: *) ****pt us*r-provi*** URLs, *) R*solv* *ostn