tgstation-server is a production scale tool for BYOND server management. Prior to 6.12.3, roles used to authorize API methods were incorrectly OR'd instead of AND'ed with the role used to determine if a user was enabled. This allows enabled users access to most, but not all, authorized actions regardless of their permissions. Notably, the WriteUsers right is unaffected so users may not use this bug to permanently elevate their account permissions. The fix is release in tgstation-server-v6.12.3.
History

Mon, 06 Jan 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 06 Jan 2025 15:45:00 +0000

Type Values Removed Values Added
Description tgstation-server is a production scale tool for BYOND server management. Prior to 6.12.3, roles used to authorize API methods were incorrectly OR'd instead of AND'ed with the role used to determine if a user was enabled. This allows enabled users access to most, but not all, authorized actions regardless of their permissions. Notably, the WriteUsers right is unaffected so users may not use this bug to permanently elevate their account permissions. The fix is release in tgstation-server-v6.12.3.
Title tgstation-server's role authorization incorrectly OR'd with user's enabled status
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-01-06T15:38:20.174Z

Updated: 2025-01-06T16:49:47.461Z

Reserved: 2024-12-29T03:00:24.713Z

Link: CVE-2025-21611

cve-icon Vulnrichment

Updated: 2025-01-06T16:49:42.653Z

cve-icon NVD

Status : Received

Published: 2025-01-06T16:15:31.413

Modified: 2025-01-06T16:15:31.413

Link: CVE-2025-21611

cve-icon Redhat

No data.