UBUNTU-CVE-2020-15251

Source
https://ubuntu.com/security/CVE-2020-15251
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-15251.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2020-15251
Upstream
Published
2020-10-13T18:15:00Z
Modified
2025-10-24T04:48:35Z
Severity
  • 7.7 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N CVSS Calculator
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg.

References

Affected packages

Ubuntu:16.04:LTS / sopel

Package

Name
sopel
Purl
pkg:deb/ubuntu/sopel@6.3.0-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.1.1-1
6.3.0-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "6.3.0-1",
            "binary_name": "sopel"
        },
        {
            "binary_version": "6.3.0-1",
            "binary_name": "willie"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-15251.json"

Ubuntu:18.04:LTS / sopel

Package

Name
sopel
Purl
pkg:deb/ubuntu/sopel@6.5.0-1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.5.0-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "6.5.0-1",
            "binary_name": "sopel"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-15251.json"

Ubuntu:20.04:LTS / sopel

Package

Name
sopel
Purl
pkg:deb/ubuntu/sopel@6.6.9-1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.6.3-2
6.6.9-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "6.6.9-1",
            "binary_name": "sopel"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-15251.json"

Ubuntu:22.04:LTS / sopel

Package

Name
sopel
Purl
pkg:deb/ubuntu/sopel@6.6.9-2?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.6.9-1
6.6.9-2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "6.6.9-2",
            "binary_name": "sopel"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-15251.json"