HTB Pterodactyl Pterodactyl Panel CVE-2025-49132 LFI-to-RCE ...#2247
Open
carlospolop wants to merge 1 commit into
Open
HTB Pterodactyl Pterodactyl Panel CVE-2025-49132 LFI-to-RCE ...#2247carlospolop wants to merge 1 commit into
carlospolop wants to merge 1 commit into
Conversation
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://0xdf.gitlab.io/2026/05/16/htb-pterodactyl.html Content Categories: Based on the analysis, this content was categorized under "Pentesting Web -> File Inclusion/Path Traversal -> LFI2RCE via PHP-PEAR pearcmd.php; optionally Network Services Pentesting -> 80,443 -> Pterodactyl Panel / Laravel and Linux Privilege Escalation -> Polkit/udisks openSUSE CVE-2025-6018/CVE-2025-6019 if detailed exploit steps are present". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Overview
The post is a full technical exploitation walkthrough of the HackTheBox Linux machine Pterodactyl. The target hosts a Minecraft community website and a Pterodactyl Panel game-server management panel. The attack chain starts with unauthenticated exploitation of CVE-2025-49132 in Pterodactyl Panel v1.11.10, turning a locale-file inclusion bug into remote command execution using the classicpearcmd.php...
- Better
- Reliable
- Laravel translation-loader LFI pattern (
- Config-array exfil note (
- References to the Pterodactyl advisory and 0xdf post
- Reviewed the diff successfully
🔧 Technical Details
Unauthenticated Laravel translation-loader file inclusion: If a Laravel application exposes a translation-loading endpoint where attacker-controlled values are passed into
Illuminate\Translation\FileLoader::load(), those values may be used to construct a path like{$path}/{$locale}/{$group}.php. If the loader then callsgetRequire(), traversal inlocaleorgroup/namespacecan include and execute arbitrary readable.phpfiles. This can leak PHP configuration arrays, such asconfig/database.php, or bootstrap unintended PHP entry points. Fixes should validate locale and namespace strictly, for example limiting locale to two lowercase characters and namespace to expected lowercase identifiers only.LFI-to-RCE using PHP-PEAR pearcmd.php: When an LFI can include arbitrary
.phpfiles and PHP-PEAR is installed,pearcmd.phpcan become an RCE ga...🤖 Agent Actions
Done.
Updated:
src/pentesting-web/file-inclusion/README.mdAdded:
pearcmd.phpLFI2RCE prerequisites/recon+-split HTTP argv payload notesFileLoader::load()→getRequire())config/database.php-style leaks)Validation:
mdbook buildcould not run becausemdbookis not installed in this environmentThis PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.