CVE-2024-27102

Improper isolation of server file access in github.com/pterodactyl/wings

Description

Wings is the server control plane for Pterodactyl Panel. This vulnerability impacts anyone running the affected versions of Wings. The vulnerability can potentially be used to access files and directories on the host system. The full scope of impact is exactly unknown, but reading files outside of a server's base directory (sandbox root) is possible. In order to use this exploit, an attacker must have an existing "server" allocated and controlled by Wings. Details on the exploitation of this vulnerability are embargoed until March 27th, 2024 at 18:00 UTC. In order to mitigate this vulnerability, a full rewrite of the entire server filesystem was necessary. Because of this, the size of the patch is massive, however effort was made to reduce the amount of breaking changes. Users are advised to update to version 1.11.9. There are no known workarounds for this vulnerability.

Category

9.9
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 0.33%
Vendor Advisory github.com
Affected: pterodactyl wings
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-27102?
CVE-2024-27102 has been scored as a critical severity vulnerability.
How to fix CVE-2024-27102?
To fix CVE-2024-27102, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-27102 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-27102 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-27102?
CVE-2024-27102 affects pterodactyl wings.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.