Lucene search

K
cve[email protected]CVE-2023-33198
HistoryMay 30, 2023 - 5:15 a.m.

CVE-2023-33198

2023-05-3005:15:12
CWE-941
web.nvd.nist.gov
12
tgstation-server
chat channel poisoning
dreammaker api
dmapi
cve-2023-33198
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

49.6%

tgstation-server is a production scale tool for BYOND server management. The DreamMaker API (DMAPI) chat channel cache can possibly be poisoned by a tgstation-server (TGS) restart and reattach. This can result in sending chat messages to one of any of the configured IRC or Discord channels for the instance on enabled chat bots. This lasts until the instance’s chat channels are updated in TGS or DreamDaemon is restarted. TGS chat commands are unaffected, custom or otherwise.

Affected configurations

Vulners
NVD
Node
tgstationtgstation_serverRange4.0.05.12.2

CNA Affected

[
  {
    "vendor": "tgstation",
    "product": "tgstation-server",
    "versions": [
      {
        "version": ">= 4.0.0, < 5.12.2",
        "status": "affected"
      }
    ]
  }
]

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.001 Low

EPSS

Percentile

49.6%

Related for CVE-2023-33198