The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade github.com/pterodactyl/wings/server
to version 1.7.5, 1.11.6 or higher.
Affected versions of this package are vulnerable to Execution with Unnecessary Privileges by a user is able to modify a server's install script or to supply code which is executed by the install script (either through environment variables, or commands that execute commands based on user data). This allows commands to be executed on the host, escaping from the container from which they originated.
Running with a rootless container runtime may mitigate the severity of any attacks. However, the majority of users run as root as per the documentation. Also, SELinux may prevent attackers from performing certain operations against the host system, but privileged containers have a lot of freedom even on systems with SELinux enabled.
This is exploitable by Panel administrator users, or via certain eggs (the data structure that holds the install scripts that get passed to Wings) that unknowingly execute shell commands with escalated privileges provided by untrusted user data.