Impact
If a Windows user was registered in tgstation-server (TGS), an attacker could discover their username by brute-forcing the login endpoint with an invalid password. When a valid Windows logon was found, a distinct response would be generated.
Patches
#1526
Workarounds
If Windows users have ever been registered into the TGS installation and TGS is exposed to attackers, this cannot be completely prevented. It can be mitigated by rate-limiting API calls with software that sits in front of TGS in the HTTP pipeline such as fail2ban.
Impact
If a Windows user was registered in tgstation-server (TGS), an attacker could discover their username by brute-forcing the login endpoint with an invalid password. When a valid Windows logon was found, a distinct response would be generated.
Patches
#1526
Workarounds
If Windows users have ever been registered into the TGS installation and TGS is exposed to attackers, this cannot be completely prevented. It can be mitigated by rate-limiting API calls with software that sits in front of TGS in the HTTP pipeline such as fail2ban.