GHSA-6rg3-8h8x-5xfv: Unchecked hostname resolution could allow access to local network resources by users outside the local network
6.4
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
6/23/2021
Updated
1/9/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
github.com/pterodactyl/wings | go | = 1.2.0 | 1.2.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description indicates a missing hostname verification step in a file download route. While exact code isn't available, Go HTTP
client patterns suggest the file download handler would: 1) Accept user-provided URLs, 2) Resolve hostnames, 3) Initiate transfers. The lack of IP validation after DNS resolution (to block private/rfc1918 addresses) would manifest in the download handler function
. The medium confidence reflects educated guessing based on vulnerability patterns in Go web services, though without concrete code evidence.