CVE-2024-41799: tgstation-server's DreamMaker environment files outside the deployment directory can be compiled and ran by insufficiently permissioned users
What kind of vulnerability is it? Who is impacted?
Low permission users using the “Set .dme Path” privilege could potentially set malicious .dme files existing on the host machine to be compiled and executed.
These .dme files could be uploaded via tgstation-server (requiring a separate, isolated privilege) or some other means.
A server configured to execute in BYOND’s trusted security level (requiring a third separate, isolated privilege OR being set by another user) could lead to this escalating into remote code execution via BYOND’s shell() proc.
The ability to execute this kind of attack is a known side effect of having privileged TGS users, but normally requires multiple privileges with known weaknesses. This vector is not intentional as it does not require control over the where deployment code is sourced from and may not require remote write access to an instance’s Configuration
directory.
References
- github.com/advisories/GHSA-c3h4-9gc2-f7h4
- github.com/tgstation/tgstation-server
- github.com/tgstation/tgstation-server/commit/374852fe5ae306415eb5aafb2d16b06897d7afe4
- github.com/tgstation/tgstation-server/pull/1835
- github.com/tgstation/tgstation-server/security/advisories/GHSA-c3h4-9gc2-f7h4
- nvd.nist.gov/vuln/detail/CVE-2024-41799
Detect and mitigate CVE-2024-41799 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →