Vulnerability Details : CVE-2023-32687
tgstation-server is a toolset to manage production BYOND servers. Starting in version 4.7.0 and prior to 5.12.1, instance users with the list chat bots permission can read chat bot connections strings without the associated permission. This issue is patched in version 5.12.1. As a workaround, remove the list chat bots permission from users that should not have the ability to view connection strings. Invalidate any credentials previously stored for safety.
Products affected by CVE-2023-32687
- cpe:2.3:a:tgstation13:tgstation-server:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-32687
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 40 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-32687
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
2.8
|
3.6
|
NIST | |
7.7
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
3.1
|
4.0
|
GitHub, Inc. |
CWE ids for CVE-2023-32687
-
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.Assigned by:
- nvd@nist.gov (Primary)
- security-advisories@github.com (Secondary)
References for CVE-2023-32687
-
https://github.com/tgstation/tgstation-server/pull/1487
Fix exploit allowing for the reading of discord connection strings. by MrStonedOne · Pull Request #1487 · tgstation/tgstation-server · GitHubPatch
-
https://github.com/tgstation/tgstation-server/releases/tag/tgstation-server-v5.12.1
Release tgstation-server-v5.12.1 · tgstation/tgstation-server · GitHubRelease Notes
-
https://github.com/tgstation/tgstation-server/security/advisories/GHSA-rv76-495p-g7cp
Insufficiently Protected ChatBot Credentials in tgstation-server · Advisory · tgstation/tgstation-server · GitHubVendor Advisory
Jump to