CVE-2024-21663

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-21663
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-21663.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-21663
Aliases
  • GHSA-fjcj-g7x8-4rp7
Published
2024-01-08T23:57:54.897Z
Modified
2025-11-30T11:25:24.182433Z
Severity
  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Remote code execution on ReconServer due to improper input sanitization on the prips command
Details

Discord-Recon is a Discord bot created to automate bug bounty recon, automated scans and information gathering via a discord server. Discord-Recon is vulnerable to remote code execution. An attacker is able to execute shell commands in the server without having an admin role. This vulnerability has been fixed in version 0.0.8.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/21xxx/CVE-2024-21663.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-20"
    ]
}
References

Affected packages

Git / github.com/demon1a/discord-recon

Affected ranges

Type
GIT
Repo
https://github.com/demon1a/discord-recon
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0,0.*

0,0.3

0.*

0.0.1
0.0.2
0.0.4
0.0.5
0.0.6