logo

CVE-2021-21431 sopel-plugins-channelmgnt

Package

Manager: pip
Name: sopel-plugins-channelmgnt
Vulnerable Version: =1.0.0 || =1.0.1 || =1.0.2 || =1.0.3 || =1.0.4 || =1.0.5 || =1.0.6 || =2.0 || >=0 <2.0.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:P/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H

EPSS: 0.00103 pctl0.28906

Details

Improper Input Validation in sopel-plugins.channelmgnt ### Impact On some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. ### Patches Upgrade to 2.0.1 or higher ### Workarounds Do not use this plugin on networks where TARGMAX > 1. ### For more information If you have any questions or comments about this advisory: * Open an issue on [phab](https://phab.mirahezebots.org/maniphest/task/edit/form/1/). * Email us at [staff(at)mirahezebots(dot)org](mailto:staff@mirahezebots.org)

Metadata

Created: 2021-04-09T15:42:40Z
Modified: 2024-10-25T21:24:11.385295Z
Source: https://osv-vulnerabilities
CWE IDs: ["CWE-20", "CWE-284"]
Alternative ID: N/A
Finding: F184
Auto approve: 1