GHSA-mp9m-g7qj-6vqr

Suggest an improvement
Source
https://github.com/advisories/GHSA-mp9m-g7qj-6vqr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/10/GHSA-mp9m-g7qj-6vqr/GHSA-mp9m-g7qj-6vqr.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-mp9m-g7qj-6vqr
Aliases
Related
Published
2020-10-27T20:30:48Z
Modified
2024-10-25T22:00:49.441999Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N CVSS Calculator
  • 5.1 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N CVSS Calculator
Summary
Unauthorized privilege escalation in Mod module
Details

Impact

An unauthorized privilege escalation exploit has been discovered in the Mod module: this exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user's control. By abusing this exploit, it's possible to perform destructive actions within the guild the user has high privileges in.

Patches

This exploit has been fixed on version & 3.4.1.

Workarounds

Unloading the Mod module with unload mod or, disabling the massban command with command disable global massban can render this exploit not accessible. We still highly recommend updating to 3.4.1 to completely patch this issue.

References

  • https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b

For more information

If you have any questions or comments about this advisory: * Open an issue in Cog-Creators/Red-DiscordBot * Over on our Discord server

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-285"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2020-10-27T20:26:42Z"
}
References

Affected packages

PyPI / red-discordbot

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.4.1

Affected versions

3.*

3.0.0b16
3.0.0b17
3.0.0b18
3.0.0b19
3.0.0b20
3.0.0b21
3.0.0rc1
3.0.0rc1.post1
3.0.0rc2
3.0.0rc3
3.0.0rc3.post1
3.0.0
3.0.1
3.0.2
3.1.0
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
3.1.7
3.1.8
3.1.9
3.2.0
3.2.1
3.2.2
3.2.3
3.3.0
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6
3.3.7
3.3.8
3.3.9
3.3.10
3.3.11
3.3.12
3.4.0