Execution with Unnecessary Privileges Affecting github.com/pterodactyl/wings/server package, versions <1.7.5>=1.11.0-rc.1 <1.11.6


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.21% (60th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMPTERODACTYLWINGSSERVER-5529843
  • published12 May 2023
  • disclosed11 May 2023
  • creditChirag L.

Introduced: 11 May 2023

CVE-2023-32080  (opens in a new tab)
CWE-250  (opens in a new tab)

How to fix?

Upgrade github.com/pterodactyl/wings/server to version 1.7.5, 1.11.6 or higher.

Overview

Affected versions of this package are vulnerable to Execution with Unnecessary Privileges by a user is able to modify a server's install script or to supply code which is executed by the install script (either through environment variables, or commands that execute commands based on user data). This allows commands to be executed on the host, escaping from the container from which they originated.

Workaround

Running with a rootless container runtime may mitigate the severity of any attacks. However, the majority of users run as root as per the documentation. Also, SELinux may prevent attackers from performing certain operations against the host system, but privileged containers have a lot of freedom even on systems with SELinux enabled.

This is exploitable by Panel administrator users, or via certain eggs (the data structure that holds the install scripts that get passed to Wings) that unknowingly execute shell commands with escalated privileges provided by untrusted user data.

CVSS Scores

version 3.1