5 results (0.007 seconds)

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 0

TGstation is a toolset to manage production BYOND servers. In affected versions if a Windows user was registered in tgstation-server (TGS), an attacker could discover their username by brute-forcing the login endpoint with an invalid password. When a valid Windows logon was found, a distinct response would be generated. This issue has been addressed in version 5.12.5. Users are advised to upgrade. • https://github.com/tgstation/tgstation-server/pull/1526 https://github.com/tgstation/tgstation-server/security/advisories/GHSA-w3jx-4x93-76ph • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

tgstation-server is a production scale tool for BYOND server management. The DreamMaker API (DMAPI) chat channel cache can possibly be poisoned by a tgstation-server (TGS) restart and reattach. This can result in sending chat messages to one of any of the configured IRC or Discord channels for the instance on enabled chat bots. This lasts until the instance's chat channels are updated in TGS or DreamDaemon is restarted. TGS chat commands are unaffected, custom or otherwise. • https://github.com/tgstation/tgstation-server/pull/1493 https://github.com/tgstation/tgstation-server/releases/tag/tgstation-server-v5.12.2 https://github.com/tgstation/tgstation-server/security/advisories/GHSA-p2xj-w57r-6f5m • CWE-941: Incorrectly Specified Destination in a Communication Channel •

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 0

tgstation-server is a toolset to manage production BYOND servers. Starting in version 4.7.0 and prior to 5.12.1, instance users with the list chat bots permission can read chat bot connections strings without the associated permission. This issue is patched in version 5.12.1. As a workaround, remove the list chat bots permission from users that should not have the ability to view connection strings. Invalidate any credentials previously stored for safety. • https://github.com/tgstation/tgstation-server/pull/1487 https://github.com/tgstation/tgstation-server/releases/tag/tgstation-server-v5.12.1 https://github.com/tgstation/tgstation-server/security/advisories/GHSA-rv76-495p-g7cp • CWE-522: Insufficiently Protected Credentials •

CVSS: 7.7EPSS: 0%CPEs: 2EXPL: 0

In tgstation-server 4.4.0 and 4.4.1, an authenticated user with permission to download logs can download any file on the server machine (accessible by the owner of the server process) via directory traversal ../ sequences in /Administration/Logs/ requests. The attacker is unable to enumerate files, however. En tgstation-server versiones 4.4.0 y 4.4.1, un usuario autenticado con permiso para descargar registros puede descargar cualquier archivo en la máquina del servidor (accesible por el propietario del proceso del servidor) por medio de secuencias ../ de salto de directorio en peticiones a /Administration/Logs/. Sin embargo, el atacante no puede enumerar archivos • https://github.com/tgstation/tgstation-server https://github.com/tgstation/tgstation-server/security/advisories/GHSA-r8pp-42wr-2gc4 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

In Tgstation tgstation-server 3.2.4.0 through 3.2.1.0 (fixed in 3.2.5.0), active logins would be cached, allowing subsequent logins to succeed with any username or password. En Tgstation tgstation-server, de la versión 3.2.4.0 a la 3.2.1.0 (solucionado en la versión 3.2.5.0), los inicios de sesión activos se cachean, lo que permite inicios de sesión subsecuentes exitosos con cualquier nombre de usuario o contraseña. • https://github.com/tgstation/tgstation-server/issues/690 •