Vulnerabilites related to tgstation - tgstation-server
CVE-2024-41799 (GCVE-0-2024-41799)
Vulnerability from cvelistv5
Published
2024-07-29 15:00
Modified
2024-08-02 04:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
tgstation-server is a production scale tool for BYOND server management. Prior to 6.8.0, low permission users using the "Set .dme Path" privilege could potentially set malicious .dme files existing on the host machine to be compiled and executed. These .dme files could be uploaded via tgstation-server (requiring a separate, isolated privilege) or some other means. A server configured to execute in BYOND's trusted security level (requiring a third separate, isolated privilege OR being set by another user) could lead to this escalating into remote code execution via BYOND's shell() proc. The ability to execute this kind of attack is a known side effect of having privileged TGS users, but normally requires multiple privileges with known weaknesses. This vector is not intentional as it does not require control over the where deployment code is sourced from and _may_ not require remote write access to an instance's `Configuration` directory. This problem is fixed in versions 6.8.0 and above.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
tgstation | tgstation-server |
Version: >= 4.0.0, < 6.8.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:tgstation13:tgstation-server:4.0.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "tgstation-server", "vendor": "tgstation13", "versions": [ { "lessThan": "6.8.0", "status": "affected", "version": "4.0.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-41799", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-29T17:40:12.363650Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-29T17:42:45.745Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:46:52.940Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-c3h4-9gc2-f7h4", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-c3h4-9gc2-f7h4" }, { "name": "https://github.com/tgstation/tgstation-server/pull/1835", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/tgstation/tgstation-server/pull/1835" }, { "name": "https://github.com/tgstation/tgstation-server/commit/374852fe5ae306415eb5aafb2d16b06897d7afe4", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/tgstation/tgstation-server/commit/374852fe5ae306415eb5aafb2d16b06897d7afe4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "tgstation-server", "vendor": "tgstation", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 6.8.0" } ] } ], "descriptions": [ { "lang": "en", "value": "tgstation-server is a production scale tool for BYOND server management. Prior to 6.8.0, low permission users using the \"Set .dme Path\" privilege could potentially set malicious .dme files existing on the host machine to be compiled and executed. These .dme files could be uploaded via tgstation-server (requiring a separate, isolated privilege) or some other means. A server configured to execute in BYOND\u0027s trusted security level (requiring a third separate, isolated privilege OR being set by another user) could lead to this escalating into remote code execution via BYOND\u0027s shell() proc. The ability to execute this kind of attack is a known side effect of having privileged TGS users, but normally requires multiple privileges with known weaknesses. This vector is not intentional as it does not require control over the where deployment code is sourced from and _may_ not require remote write access to an instance\u0027s `Configuration` directory. This problem is fixed in versions 6.8.0 and above." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-29T15:00:23.851Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-c3h4-9gc2-f7h4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-c3h4-9gc2-f7h4" }, { "name": "https://github.com/tgstation/tgstation-server/pull/1835", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/tgstation/tgstation-server/pull/1835" }, { "name": "https://github.com/tgstation/tgstation-server/commit/374852fe5ae306415eb5aafb2d16b06897d7afe4", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/tgstation/tgstation-server/commit/374852fe5ae306415eb5aafb2d16b06897d7afe4" } ], "source": { "advisory": "GHSA-c3h4-9gc2-f7h4", "discovery": "UNKNOWN" }, "title": "tgstation-server\u0027s DreamMaker environment files outside the deployment directory can be compiled and ran by insufficiently permissioned users" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-41799", "datePublished": "2024-07-29T15:00:23.851Z", "dateReserved": "2024-07-22T13:57:37.134Z", "dateUpdated": "2024-08-02T04:46:52.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-32687 (GCVE-0-2023-32687)
Vulnerability from cvelistv5
Published
2023-05-29 20:03
Modified
2025-01-13 21:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-522 - Insufficiently Protected Credentials
Summary
tgstation-server is a toolset to manage production BYOND servers. Starting in version 4.7.0 and prior to 5.12.1, instance users with the list chat bots permission can read chat bot connections strings without the associated permission. This issue is patched in version 5.12.1. As a workaround, remove the list chat bots permission from users that should not have the ability to view connection strings. Invalidate any credentials previously stored for safety.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
tgstation | tgstation-server |
Version: >= 4.7.0, < 5.12.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:25:36.726Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-rv76-495p-g7cp", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-rv76-495p-g7cp" }, { "name": "https://github.com/tgstation/tgstation-server/pull/1487", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/tgstation/tgstation-server/pull/1487" }, { "name": "https://github.com/tgstation/tgstation-server/releases/tag/tgstation-server-v5.12.1", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/tgstation/tgstation-server/releases/tag/tgstation-server-v5.12.1" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-32687", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-13T21:00:29.332629Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-13T21:00:37.691Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tgstation-server", "vendor": "tgstation", "versions": [ { "status": "affected", "version": "\u003e= 4.7.0, \u003c 5.12.1" } ] } ], "descriptions": [ { "lang": "en", "value": "tgstation-server is a toolset to manage production BYOND servers. Starting in version 4.7.0 and prior to 5.12.1, instance users with the list chat bots permission can read chat bot connections strings without the associated permission. This issue is patched in version 5.12.1. As a workaround, remove the list chat bots permission from users that should not have the ability to view connection strings. Invalidate any credentials previously stored for safety." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522: Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-29T20:03:05.983Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-rv76-495p-g7cp", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-rv76-495p-g7cp" }, { "name": "https://github.com/tgstation/tgstation-server/pull/1487", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/tgstation/tgstation-server/pull/1487" }, { "name": "https://github.com/tgstation/tgstation-server/releases/tag/tgstation-server-v5.12.1", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/tgstation/tgstation-server/releases/tag/tgstation-server-v5.12.1" } ], "source": { "advisory": "GHSA-rv76-495p-g7cp", "discovery": "UNKNOWN" }, "title": "Insufficiently Protected ChatBot Credentials in tgstation-server" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-32687", "datePublished": "2023-05-29T20:03:05.983Z", "dateReserved": "2023-05-11T16:33:45.732Z", "dateUpdated": "2025-01-13T21:00:37.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-33198 (GCVE-0-2023-33198)
Vulnerability from cvelistv5
Published
2023-05-30 04:37
Modified
2025-01-10 20:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-941 - Incorrectly Specified Destination in a Communication Channel
Summary
tgstation-server is a production scale tool for BYOND server management. The DreamMaker API (DMAPI) chat channel cache can possibly be poisoned by a tgstation-server (TGS) restart and reattach. This can result in sending chat messages to one of any of the configured IRC or Discord channels for the instance on enabled chat bots. This lasts until the instance's chat channels are updated in TGS or DreamDaemon is restarted. TGS chat commands are unaffected, custom or otherwise.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
tgstation | tgstation-server |
Version: >= 4.0.0, < 5.12.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:39:35.660Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-p2xj-w57r-6f5m", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-p2xj-w57r-6f5m" }, { "name": "https://github.com/tgstation/tgstation-server/pull/1493", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/tgstation/tgstation-server/pull/1493" }, { "name": "https://github.com/tgstation/tgstation-server/releases/tag/tgstation-server-v5.12.2", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/tgstation/tgstation-server/releases/tag/tgstation-server-v5.12.2" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-33198", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-10T20:08:22.883068Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-10T20:08:33.075Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tgstation-server", "vendor": "tgstation", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 5.12.2" } ] } ], "descriptions": [ { "lang": "en", "value": "tgstation-server is a production scale tool for BYOND server management. The DreamMaker API (DMAPI) chat channel cache can possibly be poisoned by a tgstation-server (TGS) restart and reattach. This can result in sending chat messages to one of any of the configured IRC or Discord channels for the instance on enabled chat bots. This lasts until the instance\u0027s chat channels are updated in TGS or DreamDaemon is restarted. TGS chat commands are unaffected, custom or otherwise.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-941", "description": "CWE-941: Incorrectly Specified Destination in a Communication Channel", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-30T04:37:13.928Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-p2xj-w57r-6f5m", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-p2xj-w57r-6f5m" }, { "name": "https://github.com/tgstation/tgstation-server/pull/1493", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/tgstation/tgstation-server/pull/1493" }, { "name": "https://github.com/tgstation/tgstation-server/releases/tag/tgstation-server-v5.12.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/tgstation/tgstation-server/releases/tag/tgstation-server-v5.12.2" } ], "source": { "advisory": "GHSA-p2xj-w57r-6f5m", "discovery": "UNKNOWN" }, "title": "Incorrectly Specified Chat Message Destinations in tgstation-server and DreamMaker API" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-33198", "datePublished": "2023-05-30T04:37:13.928Z", "dateReserved": "2023-05-17T22:25:50.700Z", "dateUpdated": "2025-01-10T20:08:33.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-21611 (GCVE-0-2025-21611)
Vulnerability from cvelistv5
Published
2025-01-06 15:38
Modified
2025-01-06 16:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-285 - Improper Authorization
Summary
tgstation-server is a production scale tool for BYOND server management. Prior to 6.12.3, roles used to authorize API methods were incorrectly OR'd instead of AND'ed with the role used to determine if a user was enabled. This allows enabled users access to most, but not all, authorized actions regardless of their permissions. Notably, the WriteUsers right is unaffected so users may not use this bug to permanently elevate their account permissions. The fix is release in tgstation-server-v6.12.3.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
tgstation | tgstation-server |
Version: >= 6.11.0, < 6.12.3 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-21611", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-06T16:49:39.073394Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-06T16:49:47.461Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tgstation-server", "vendor": "tgstation", "versions": [ { "status": "affected", "version": "\u003e= 6.11.0, \u003c 6.12.3" } ] } ], "descriptions": [ { "lang": "en", "value": "tgstation-server is a production scale tool for BYOND server management. Prior to 6.12.3, roles used to authorize API methods were incorrectly OR\u0027d instead of AND\u0027ed with the role used to determine if a user was enabled. This allows enabled users access to most, but not all, authorized actions regardless of their permissions. Notably, the WriteUsers right is unaffected so users may not use this bug to permanently elevate their account permissions. The fix is release in tgstation-server-v6.12.3." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-06T15:38:20.174Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-rf5r-q276-vrc4", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-rf5r-q276-vrc4" }, { "name": "https://github.com/tgstation/tgstation-server/issues/2064", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/tgstation/tgstation-server/issues/2064" }, { "name": "https://github.com/tgstation/tgstation-server/commit/e7b1189620baaf03c2d23f6e164d07c7c7d87d57", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/tgstation/tgstation-server/commit/e7b1189620baaf03c2d23f6e164d07c7c7d87d57" } ], "source": { "advisory": "GHSA-rf5r-q276-vrc4", "discovery": "UNKNOWN" }, "title": "tgstation-server\u0027s role authorization incorrectly OR\u0027d with user\u0027s enabled status" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-21611", "datePublished": "2025-01-06T15:38:20.174Z", "dateReserved": "2024-12-29T03:00:24.713Z", "dateUpdated": "2025-01-06T16:49:47.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-34243 (GCVE-0-2023-34243)
Vulnerability from cvelistv5
Published
2023-06-08 21:09
Modified
2025-01-06 19:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
TGstation is a toolset to manage production BYOND servers. In affected versions if a Windows user was registered in tgstation-server (TGS), an attacker could discover their username by brute-forcing the login endpoint with an invalid password. When a valid Windows logon was found, a distinct response would be generated. This issue has been addressed in version 5.12.5. Users are advised to upgrade. Users unable to upgrade may be mitigated by rate-limiting API calls with software that sits in front of TGS in the HTTP pipeline such as fail2ban.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
tgstation | tgstation-server |
Version: >= 4.0.0, < 5.12.5 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:01:54.352Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-w3jx-4x93-76ph", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-w3jx-4x93-76ph" }, { "name": "https://github.com/tgstation/tgstation-server/pull/1526", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/tgstation/tgstation-server/pull/1526" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-34243", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-06T19:27:12.277382Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-06T19:27:20.871Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tgstation-server", "vendor": "tgstation", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 5.12.5" } ] } ], "descriptions": [ { "lang": "en", "value": "TGstation is a toolset to manage production BYOND servers. In affected versions if a Windows user was registered in tgstation-server (TGS), an attacker could discover their username by brute-forcing the login endpoint with an invalid password. When a valid Windows logon was found, a distinct response would be generated. This issue has been addressed in version 5.12.5. Users are advised to upgrade. Users unable to upgrade may be mitigated by rate-limiting API calls with software that sits in front of TGS in the HTTP pipeline such as fail2ban." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-08T21:09:14.628Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-w3jx-4x93-76ph", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/tgstation/tgstation-server/security/advisories/GHSA-w3jx-4x93-76ph" }, { "name": "https://github.com/tgstation/tgstation-server/pull/1526", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/tgstation/tgstation-server/pull/1526" } ], "source": { "advisory": "GHSA-w3jx-4x93-76ph", "discovery": "UNKNOWN" }, "title": "Windows user name disclosure in TGstation" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-34243", "datePublished": "2023-06-08T21:09:14.628Z", "dateReserved": "2023-05-31T13:51:51.172Z", "dateUpdated": "2025-01-06T19:27:20.871Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }