Vulnerabilites related to mirahezebots - channelmgnt
Vulnerability from fkie_nvd
Published
2021-04-09 16:15
Modified
2024-11-21 05:48
Severity ?
7.6 (High) - CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H
Summary
sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX > 1.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mirahezebots | channelmgnt | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mirahezebots:channelmgnt:*:*:*:*:*:sopel:*:*", "matchCriteriaId": "F65E996A-D825-4819-BC87-8A0A160A9CAF", "versionEndExcluding": "2.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX \u003e 1." }, { "lang": "es", "value": "sopel-channelmgnt es un plugin de channelmgnt para sopel.\u0026#xa0;En versiones anteriores a 2.0.1, en algunos servidores IRC, unas restricciones sobre la eliminaci\u00f3n del bot usando el comando kick/kickban podr\u00edan omitirse al patear a varios usuarios a la vez.\u0026#xa0;Tambi\u00e9n creemos que puede haber sido posible eliminar usuarios de otros canales, pero debido a la maravilla que es el IRC y los siguientes RfC, no tenemos POC para eso.\u0026#xa0;Freenode no est\u00e1 afectado.\u0026#xa0;Esto es corregido en versi\u00f3n 2.0.1.\u0026#xa0;Como soluci\u00f3n alternativa, no usar este plugin en redes donde TARGMAX versi\u00f3n posterior a 1" } ], "id": "CVE-2021-21431", "lastModified": "2024-11-21T05:48:20.867", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.8, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-09T16:15:11.837", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m" }, { "source": "security-advisories@github.com", "tags": [ "Product", "Third Party Advisory" ], "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" }, { "lang": "en", "value": "CWE-284" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-13 18:15
Modified
2024-11-21 05:05
Severity ?
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mirahezebots | channelmgnt | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mirahezebots:channelmgnt:*:*:*:*:*:sopel:*:*", "matchCriteriaId": "E10F251F-1B86-43BA-9710-9886B13C1D93", "versionEndExcluding": "1.0.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg." }, { "lang": "es", "value": "En el plug-in Channelmgnt para Sopel (un bot de IRC Python) anterior a la versi\u00f3n 1.0.3, los usuarios maliciosos pueden op/voice y tomar el control de un canal. Esta es una vulnerabilidad de bypass ACL. Este plugin est\u00e1 incluido en MirahezeBot-Plugins con versiones a partir de la versi\u00f3n 9.0.0 y menos de la versi\u00f3n 9.0.2 afectadas. La versi\u00f3n 9.0.2 incluida la versi\u00f3n 1.0.3 de channelmgnt, y por lo tanto est\u00e1 a salvo de esta vulnerabilidad. Ver la referencia GHSA-23pc-4339-95vg" } ], "id": "CVE-2020-15251", "lastModified": "2024-11-21T05:05:11.727", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-13T18:15:12.780", "references": [ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/pull/3" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link" ], "url": "https://phab.bots.miraheze.wiki/T117" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/" }, { "source": "security-advisories@github.com", "tags": [ "Product", "Third Party Advisory" ], "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/pull/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://phab.bots.miraheze.wiki/T117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2020-15251 (GCVE-0-2020-15251)
Vulnerability from cvelistv5
Published
2020-10-13 17:15
Modified
2024-08-04 13:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg.
References
▼ | URL | Tags |
---|---|---|
https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5 | x_refsource_CONFIRM | |
https://github.com/MirahezeBots/sopel-channelmgnt/pull/3 | x_refsource_MISC | |
https://phab.bots.miraheze.wiki/T117 | x_refsource_MISC | |
https://pypi.org/project/sopel-plugins.channelmgnt/ | x_refsource_MISC | |
https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg | x_refsource_MISC | |
https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
MirahezeBots | sopel-channelmgnt |
Version: < 1.0.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:23.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/pull/3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phab.bots.miraheze.wiki/T117" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "sopel-channelmgnt", "vendor": "MirahezeBots", "versions": [ { "status": "affected", "version": "\u003c 1.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-15T18:44:01", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/pull/3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phab.bots.miraheze.wiki/T117" }, { "tags": [ "x_refsource_MISC" ], "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/" } ], "source": { "advisory": "GHSA-j257-jfvv-h3x5", "discovery": "UNKNOWN" }, "title": "Privilege Escalation in Channelmgnt plug-in for Sopel", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15251", "STATE": "PUBLIC", "TITLE": "Privilege Escalation in Channelmgnt plug-in for Sopel" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "sopel-channelmgnt", "version": { "version_data": [ { "version_value": "\u003c 1.0.3" } ] } } ] }, "vendor_name": "MirahezeBots" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-863: Incorrect Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5", "refsource": "CONFIRM", "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5" }, { "name": "https://github.com/MirahezeBots/sopel-channelmgnt/pull/3", "refsource": "MISC", "url": "https://github.com/MirahezeBots/sopel-channelmgnt/pull/3" }, { "name": "https://phab.bots.miraheze.wiki/T117", "refsource": "MISC", "url": "https://phab.bots.miraheze.wiki/T117" }, { "name": "https://pypi.org/project/sopel-plugins.channelmgnt/", "refsource": "MISC", "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "name": "https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg", "refsource": "MISC", "url": "https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg" }, { "name": "https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/", "refsource": "MISC", "url": "https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/" } ] }, "source": { "advisory": "GHSA-j257-jfvv-h3x5", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15251", "datePublished": "2020-10-13T17:15:17", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:23.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-21431 (GCVE-0-2021-21431)
Vulnerability from cvelistv5
Published
2021-04-09 15:45
Modified
2024-08-03 18:16
Severity ?
VLAI Severity ?
EPSS score ?
Summary
sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX > 1.
References
▼ | URL | Tags |
---|---|---|
https://pypi.org/project/sopel-plugins.channelmgnt/ | x_refsource_MISC | |
https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m | x_refsource_CONFIRM | |
https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
MirahezeBots | sopel-channelmgnt |
Version: < 2.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.236Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "sopel-channelmgnt", "vendor": "MirahezeBots", "versions": [ { "status": "affected", "version": "\u003c 2.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX \u003e 1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-12T14:18:46", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856" } ], "source": { "advisory": "GHSA-23c7-6444-399m", "discovery": "UNKNOWN" }, "title": "Improper Input Validation in sopel-plugins.channelmgnt", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21431", "STATE": "PUBLIC", "TITLE": "Improper Input Validation in sopel-plugins.channelmgnt" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "sopel-channelmgnt", "version": { "version_data": [ { "version_value": "\u003c 2.0.1" } ] } } ] }, "vendor_name": "MirahezeBots" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX \u003e 1." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] }, { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://pypi.org/project/sopel-plugins.channelmgnt/", "refsource": "MISC", "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "name": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m", "refsource": "CONFIRM", "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m" }, { "name": "https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856", "refsource": "MISC", "url": "https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856" } ] }, "source": { "advisory": "GHSA-23c7-6444-399m", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21431", "datePublished": "2021-04-09T15:45:15", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:16:22.236Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }