Vulnerability Description
TGstation is a toolset to manage production BYOND servers. In affected versions if a Windows user was registered in tgstation-server (TGS), an attacker could discover their username by brute-forcing the login endpoint with an invalid password. When a valid Windows logon was found, a distinct response would be generated. This issue has been addressed in version 5.12.5. Users are advised to upgrade. Users unable to upgrade may be mitigated by rate-limiting API calls with software that sits in front of TGS in the HTTP pipeline such as fail2ban.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tgstation13 | Tgstation-Server | >= 4.0.0.0, < 5.12.5 |
Related Weaknesses (CWE)
References
- https://github.com/tgstation/tgstation-server/pull/1526Issue TrackingPatch
- https://github.com/tgstation/tgstation-server/security/advisories/GHSA-w3jx-4x93MitigationVendor Advisory
- https://github.com/tgstation/tgstation-server/pull/1526Issue TrackingPatch
- https://github.com/tgstation/tgstation-server/security/advisories/GHSA-w3jx-4x93MitigationVendor Advisory
FAQ
What is CVE-2023-34243?
CVE-2023-34243 is a vulnerability with a CVSS score of 5.8 (MEDIUM). TGstation is a toolset to manage production BYOND servers. In affected versions if a Windows user was registered in tgstation-server (TGS), an attacker could discover their username by brute-forcing t...
How severe is CVE-2023-34243?
CVE-2023-34243 has been rated MEDIUM with a CVSS base score of 5.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-34243?
Check the references section above for vendor advisories and patch information. Affected products include: Tgstation13 Tgstation-Server.