logo

CVE-2020-15147 red-discordbot

Package

Manager: pip
Name: red-discordbot
Vulnerable Version: >=0 <3.3.12

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.02356 pctl0.84316

Details

Remote Code Execution in Red Discord Bot ### Impact A RCE exploit has been discovered in the Streams module: this exploit allows Discord users with specifically crafted "going live" messages to inject code into the Streams module's going live message. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. ### Patches This critical exploit has been fixed on version ``3.3.12`` & ``3.4``. ### Workarounds Unloading the Streams module with ``unload streams`` can render this exploit not accessible. We still highly recommend updating to ``3.3.12`` or ``3.4`` to completely patch this issue. ### References * https://github.com/Cog-Creators/Red-DiscordBot/pull/4183 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot) * Over on our [Discord server](https://discord.gg/red)

Metadata

Created: 2020-08-21T17:03:24Z
Modified: 2024-10-26T18:37:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/08/GHSA-7257-96vg-qf6x/GHSA-7257-96vg-qf6x.json
CWE IDs: ["CWE-74", "CWE-94"]
Alternative ID: GHSA-7257-96vg-qf6x
Finding: F184
Auto approve: 1