Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7257-96vg-qf6x

Опубликовано: 21 авг. 2020
Источник: github
Github: Прошло ревью
CVSS4: 7.7
CVSS3: 8.5

Описание

Remote Code Execution in Red Discord Bot

Impact

A RCE exploit has been discovered in the Streams module: this exploit allows Discord users with specifically crafted "going live" messages to inject code into the Streams module's going live message. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information.

Patches

This critical exploit has been fixed on version 3.3.12 & 3.4.

Workarounds

Unloading the Streams module with unload streams can render this exploit not accessible. We still highly recommend updating to 3.3.12 or 3.4 to completely patch this issue.

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

Red-DiscordBot

pip
Затронутые версииВерсия исправления

<= 3.3.11

3.3.12

EPSS

Процентиль: 85%
0.02356
Низкий

7.7 High

CVSS4

8.5 High

CVSS3

Дефекты

CWE-74
CWE-94

Связанные уязвимости

CVSS3: 8.5
nvd
больше 5 лет назад

Red Discord Bot before versions 3.3.12 and 3.4 has a Remote Code Execution vulnerability in the Streams module. This exploit allows Discord users with specifically crafted "going live" messages to inject code into the Streams module's going live message. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. As a workaround, unloading the Trivia module with `unload streams` can render this exploit not accessible. It is highly recommended updating to 3.3.12 or 3.4 to completely patch this issue.

EPSS

Процентиль: 85%
0.02356
Низкий

7.7 High

CVSS4

8.5 High

CVSS3

Дефекты

CWE-74
CWE-94