Vulnerability Description
In tgstation-server 4.4.0 and 4.4.1, an authenticated user with permission to download logs can download any file on the server machine (accessible by the owner of the server process) via directory traversal ../ sequences in /Administration/Logs/ requests. The attacker is unable to enumerate files, however.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tgstation13 | Tgstation-Server | 4.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/tgstation/tgstation-serverThird Party Advisory
- https://github.com/tgstation/tgstation-server/security/advisories/GHSA-r8pp-42wrThird Party Advisory
- https://github.com/tgstation/tgstation-serverThird Party Advisory
- https://github.com/tgstation/tgstation-server/security/advisories/GHSA-r8pp-42wrThird Party Advisory
FAQ
What is CVE-2020-16136?
CVE-2020-16136 is a vulnerability with a CVSS score of 7.7 (HIGH). In tgstation-server 4.4.0 and 4.4.1, an authenticated user with permission to download logs can download any file on the server machine (accessible by the owner of the server process) via directory tr...
How severe is CVE-2020-16136?
CVE-2020-16136 has been rated HIGH with a CVSS base score of 7.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-16136?
Check the references section above for vendor advisories and patch information. Affected products include: Tgstation13 Tgstation-Server.