In tgstation-server 4.4.0 and 4.4.1, an authenticated user with permission to download logs can download any file on the server machine (accessible by the owner of the server process) via directory traversal ../ sequences in /Administration/Logs/ requests. The attacker is unable to enumerate files, however.
References
Link | Resource |
---|---|
https://github.com/tgstation/tgstation-server | Third Party Advisory |
https://github.com/tgstation/tgstation-server/security/advisories/GHSA-r8pp-42wr-2gc4 | Third Party Advisory |
https://github.com/tgstation/tgstation-server | Third Party Advisory |
https://github.com/tgstation/tgstation-server/security/advisories/GHSA-r8pp-42wr-2gc4 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/tgstation/tgstation-server - Third Party Advisory | |
References | () https://github.com/tgstation/tgstation-server/security/advisories/GHSA-r8pp-42wr-2gc4 - Third Party Advisory |
Information
Published : 2020-07-31 16:15
Updated : 2024-11-21 05:06
NVD link : CVE-2020-16136
Mitre link : CVE-2020-16136
CVE.ORG link : CVE-2020-16136
JSON object : View
Products Affected
tgstation13
- tgstation-server
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')