Описание
Remote Code Execution in Red Discord Bot
Impact
A RCE exploit has been discovered in the Streams module: this exploit allows Discord users with specifically crafted "going live" messages to inject code into the Streams module's going live message. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information.
Patches
This critical exploit has been fixed on version 3.3.12 & 3.4.
Workarounds
Unloading the Streams module with unload streams can render this exploit not accessible. We still highly recommend updating to 3.3.12 or 3.4 to completely patch this issue.
References
For more information
If you have any questions or comments about this advisory:
- Open an issue in Cog-Creators/Red-DiscordBot
- Over on our Discord server
Ссылки
- https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-7257-96vg-qf6x
- https://nvd.nist.gov/vuln/detail/CVE-2020-15147
- https://github.com/Cog-Creators/Red-DiscordBot/pull/4183
- https://github.com/Cog-Creators/Red-DiscordBot/pull/4183/commits/e269ea0d3bc88417163c18431b1df38a9be92bfc
- https://github.com/Cog-Creators/Red-DiscordBot
- https://github.com/pypa/advisory-database/tree/main/vulns/red-discordbot/PYSEC-2020-266.yaml
Пакеты
Red-DiscordBot
<= 3.3.11
3.3.12
Связанные уязвимости
Red Discord Bot before versions 3.3.12 and 3.4 has a Remote Code Execution vulnerability in the Streams module. This exploit allows Discord users with specifically crafted "going live" messages to inject code into the Streams module's going live message. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. As a workaround, unloading the Trivia module with `unload streams` can render this exploit not accessible. It is highly recommended updating to 3.3.12 or 3.4 to completely patch this issue.