Affected by GO-2022-0919
and 6 other vulnerabilities
GO-2022-0919: Asymmetric Resource Consumption (Amplification) in Docker containers created by Wings in github.com/pterodactyl/wings
GO-2023-1542: Pterodactyl Wings contains UNIX Symbolic Link (Symlink) Following in github.com/pterodactyl/wings
GO-2023-1555: Pterodactyl Wings contains UNIX Symbolic Link (Symlink) Following resulting in deletion of files and directories on the host system in github.com/pterodactyl/wings
GO-2023-1768: Wings vulnerable to escape to host from installation container in github.com/pterodactyl/wings
GO-2024-2642: Pterodactyl Wings vulnerable to improper isolation of server file access in github.com/pterodactyl/wings
GO-2024-2814: Pterodactyl Wings vulnerable to Arbitrary File Write/Read in github.com/pterodactyl/wings
GO-2024-2815: Pterodactyl Wings vulnerable to Server-Side Request Forgery during remote file pull in github.com/pterodactyl/wings
Validates the received data to ensure that all of the required fields
have been passed along in the request. This should be manually run before
calling Execute().
Executes the installer process, creating the server and running through the
associated installation process based on the parameters passed through for
the server instance.