Red Discord Bot before versions 3.3.12 and 3.4 has a Remote Code Execution vulnerability in the Streams module. This exploit allows Discord users with specifically crafted "going live" messages to inject code into the Streams module's going live message. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. As a workaround, unloading the Trivia module with `unload streams` can render this exploit not accessible. It is highly recommended updating to 3.3.12 or 3.4 to completely patch this issue.
References
Link | Resource |
---|---|
https://github.com/Cog-Creators/Red-DiscordBot/pull/4183 | Patch Third Party Advisory |
https://github.com/Cog-Creators/Red-DiscordBot/pull/4183/commits/e269ea0d3bc88417163c18431b1df38a9be92bfc | Patch Third Party Advisory |
https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-7257-96vg-qf6x | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2020-08-21T17:15:16
Updated: 2020-08-21T17:15:16
Reserved: 2020-06-25T00:00:00
Link: CVE-2020-15147
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-08-21T18:15:11.690
Modified: 2021-11-18T18:36:00.340
Link: CVE-2020-15147
JSON object: View
Redhat Information
No data.