Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWhtNDUtbWdxbS1nam00
Remote Code Execution (RCE) Exploit on Cross Site Scripting (XSS) Vulnerability
Impact
A RCE exploit has been discovered in the Red Discord Bot - Dashboard Webserver: this exploit allows Discord users with specially crafted Server names and Usernames/Nicknames to inject code into the webserver front-end code. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information.
Patches
This high severity exploit has been fixed on version 0.1.7a
.
Workarounds
There are no workarounds, bot owners must upgrade their relevant packages (Dashboard module and Dashboard webserver) in order to patch this issue
References
- 99d88b8
- a6b9785
For more information
If you have any questions or comments about this advisory:
- Open an issue in Cog-Creators/Red-Dashboard
- Over on the official Red Server or at the Third Party Server Toxic Layer
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWhtNDUtbWdxbS1nam00
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 3 years ago
Updated: over 1 year ago
CVSS Score: 7.7
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
Identifiers: GHSA-hm45-mgqm-gjm4, CVE-2020-26249
References:
- https://github.com/Cog-Creators/Red-Dashboard/security/advisories/GHSA-hm45-mgqm-gjm4
- https://github.com/Cog-Creators/Red-Dashboard/commit/99d88b840674674166ce005b784ae8e31e955ab1
- https://github.com/Cog-Creators/Red-Dashboard/commit/a6b9785338003ec87fb75305e7d1cc2d40c7ab91
- https://pypi.org/project/Red-Dashboard
- https://nvd.nist.gov/vuln/detail/CVE-2020-26249
- https://github.com/advisories/GHSA-hm45-mgqm-gjm4
Blast Radius: 0.0
Affected Packages
pypi:red-dashboard
Dependent packages: 0Dependent repositories: 1
Downloads: 139 last month
Affected Version Ranges: <= 0.1.6a
Fixed in: 0.1.7a
All affected versions:
All unaffected versions: