CVE-2024-27102

9.9 CRITICAL

📋 TL;DR

This vulnerability in Pterodactyl Wings allows authenticated attackers with server access to read files outside their allocated sandbox directory, potentially accessing sensitive host system files. It affects all Wings users running versions before 1.11.9. The exact scope is unknown but includes file disclosure from the host filesystem.

💻 Affected Systems

Products:
  • Pterodactyl Wings
Versions: All versions before 1.11.9
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have an existing server allocated and controlled by Wings

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete host filesystem compromise including reading sensitive configuration files, credentials, and potentially escalating to full system control.

🟠

Likely Case

Unauthorized reading of sensitive files outside the sandbox, potentially exposing credentials, configuration data, or other server files.

🟢

If Mitigated

Limited impact if proper network segmentation and minimal privileges are already implemented, though file disclosure remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation details embargoed until March 27, 2024. Requires authenticated access to a Wings-controlled server.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.11.9

Vendor Advisory: https://github.com/pterodactyl/wings/security/advisories/GHSA-494h-9924-xww9

Restart Required: Yes

Instructions:

1. Stop all Wings instances. 2. Update to version 1.11.9 using your package manager or manual installation. 3. Restart Wings service. 4. Verify all servers are functioning correctly.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Wings instances from sensitive systems
  • Apply principle of least privilege to all user accounts and server permissions

🔍 How to Verify

Check if Vulnerable:

Check Wings version with 'wings --version' or examine service logs for version information

Check Version:

wings --version

Verify Fix Applied:

Confirm version is 1.11.9 or higher using 'wings --version'

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns
  • Requests attempting to access paths outside normal server directories
  • Errors related to file permission violations

Network Indicators:

  • Unusual outbound connections from Wings instances
  • Traffic patterns suggesting file exfiltration

SIEM Query:

source="wings" AND (event="file_access" OR event="permission_error") AND path CONTAINS ".."

🔗 References

📤 Share & Export