Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU1ajktODQ5eC0yNmg0

Remote Code Execution in Red Discord Bot

Impact

A RCE exploit has been discovered in the Trivia module: this exploit allows Discord users with specifically crafted usernames to inject code into the Trivia module's leaderboard command. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information.

Patches

This critical exploit has been fixed on version 3.3.11.

Workarounds

Unloading the Trivia module with unload trivia can render this exploit not accessible. We still highly recommend updating to 3.3.11 to completely patch this issue.

References

https://github.com/Cog-Creators/Red-DiscordBot/pull/4175

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-55j9-849x-26h4
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTU1ajktODQ5eC0yNmg0
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 3 years ago
Updated: about 1 year ago


CVSS Score: 8.2
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N

Identifiers: GHSA-55j9-849x-26h4, CVE-2020-15140
References: Repository: https://github.com/Cog-Creators/Red-DiscordBot
Blast Radius: 11.0

Affected Packages

pypi:Red-DiscordBot
Dependent packages: 2
Dependent repositories: 22
Downloads: 20,521 last month
Affected Version Ranges: < 3.3.11
Fixed in: 3.3.11
All affected versions: 3.0.0, 3.0.1, 3.0.2, 3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.1.4, 3.1.5, 3.1.6, 3.1.7, 3.1.8, 3.1.9, 3.2.0, 3.2.1, 3.2.2, 3.2.3, 3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.3.8, 3.3.9, 3.3.10
All unaffected versions: 3.3.11, 3.3.12, 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.4.4, 3.4.5, 3.4.6, 3.4.7, 3.4.8, 3.4.9, 3.4.10, 3.4.11, 3.4.12, 3.4.13, 3.4.14, 3.4.15, 3.4.16, 3.4.17, 3.4.18, 3.4.19, 3.5.0, 3.5.1, 3.5.2, 3.5.3, 3.5.4, 3.5.5, 3.5.6, 3.5.7, 3.5.8