UNIX Symbolic Link (Symlink) Following Affecting github.com/pterodactyl/wings/server/filesystem package, versions >=1.7.0 <1.7.3>=1.11.0 <1.11.3


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.28% (52nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-GOLANG-GITHUBCOMPTERODACTYLWINGSSERVERFILESYSTEM-3317177
  • published9 Feb 2023
  • disclosed8 Feb 2023
  • creditUnknown

Introduced: 8 Feb 2023

CVE-2023-25152  (opens in a new tab)
CWE-61  (opens in a new tab)

How to fix?

Upgrade github.com/pterodactyl/wings/server/filesystem to version 1.7.3, 1.11.3 or higher.

Overview

Affected versions of this package are vulnerable to UNIX Symbolic Link (Symlink) Following by allowing attackers to create new files and directory structures on the host system that previously did not exist. This can potentially allow malicious actors to change their resource allocations, promote their containers to privileged mode, or potentially add ssh authorized keys.

Note: In order to use this exploit, an attacker must have an existing "server" allocated and controlled by the Wings Daemon.

CVSS Base Scores

version 3.1