Vulnerabilites related to MirahezeBots - sopel-channelmgnt
CVE-2020-15251 (GCVE-0-2020-15251)
Vulnerability from cvelistv5
Published
2020-10-13 17:15
Modified
2024-08-04 13:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg.
References
▼ | URL | Tags |
---|---|---|
https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5 | x_refsource_CONFIRM | |
https://github.com/MirahezeBots/sopel-channelmgnt/pull/3 | x_refsource_MISC | |
https://phab.bots.miraheze.wiki/T117 | x_refsource_MISC | |
https://pypi.org/project/sopel-plugins.channelmgnt/ | x_refsource_MISC | |
https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg | x_refsource_MISC | |
https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
MirahezeBots | sopel-channelmgnt |
Version: < 1.0.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T13:08:23.235Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/pull/3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phab.bots.miraheze.wiki/T117" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "sopel-channelmgnt", "vendor": "MirahezeBots", "versions": [ { "status": "affected", "version": "\u003c 1.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863: Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-15T18:44:01", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/pull/3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phab.bots.miraheze.wiki/T117" }, { "tags": [ "x_refsource_MISC" ], "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg" }, { "tags": [ "x_refsource_MISC" ], "url": "https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/" } ], "source": { "advisory": "GHSA-j257-jfvv-h3x5", "discovery": "UNKNOWN" }, "title": "Privilege Escalation in Channelmgnt plug-in for Sopel", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-15251", "STATE": "PUBLIC", "TITLE": "Privilege Escalation in Channelmgnt plug-in for Sopel" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "sopel-channelmgnt", "version": { "version_data": [ { "version_value": "\u003c 1.0.3" } ] } } ] }, "vendor_name": "MirahezeBots" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-863: Incorrect Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5", "refsource": "CONFIRM", "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5" }, { "name": "https://github.com/MirahezeBots/sopel-channelmgnt/pull/3", "refsource": "MISC", "url": "https://github.com/MirahezeBots/sopel-channelmgnt/pull/3" }, { "name": "https://phab.bots.miraheze.wiki/T117", "refsource": "MISC", "url": "https://phab.bots.miraheze.wiki/T117" }, { "name": "https://pypi.org/project/sopel-plugins.channelmgnt/", "refsource": "MISC", "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "name": "https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg", "refsource": "MISC", "url": "https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg" }, { "name": "https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/", "refsource": "MISC", "url": "https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/" } ] }, "source": { "advisory": "GHSA-j257-jfvv-h3x5", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-15251", "datePublished": "2020-10-13T17:15:17", "dateReserved": "2020-06-25T00:00:00", "dateUpdated": "2024-08-04T13:08:23.235Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-21431 (GCVE-0-2021-21431)
Vulnerability from cvelistv5
Published
2021-04-09 15:45
Modified
2024-08-03 18:16
Severity ?
VLAI Severity ?
EPSS score ?
Summary
sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX > 1.
References
▼ | URL | Tags |
---|---|---|
https://pypi.org/project/sopel-plugins.channelmgnt/ | x_refsource_MISC | |
https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m | x_refsource_CONFIRM | |
https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
MirahezeBots | sopel-channelmgnt |
Version: < 2.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.236Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "sopel-channelmgnt", "vendor": "MirahezeBots", "versions": [ { "status": "affected", "version": "\u003c 2.0.1" } ] } ], "descriptions": [ { "lang": "en", "value": "sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX \u003e 1." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-12T14:18:46", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856" } ], "source": { "advisory": "GHSA-23c7-6444-399m", "discovery": "UNKNOWN" }, "title": "Improper Input Validation in sopel-plugins.channelmgnt", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21431", "STATE": "PUBLIC", "TITLE": "Improper Input Validation in sopel-plugins.channelmgnt" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "sopel-channelmgnt", "version": { "version_data": [ { "version_value": "\u003c 2.0.1" } ] } } ] }, "vendor_name": "MirahezeBots" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once. We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that. Freenode is not affected. This is fixed in version 2.0.1. As a workaround, do not use this plugin on networks where TARGMAX \u003e 1." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] }, { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://pypi.org/project/sopel-plugins.channelmgnt/", "refsource": "MISC", "url": "https://pypi.org/project/sopel-plugins.channelmgnt/" }, { "name": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m", "refsource": "CONFIRM", "url": "https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m" }, { "name": "https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856", "refsource": "MISC", "url": "https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856" } ] }, "source": { "advisory": "GHSA-23c7-6444-399m", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21431", "datePublished": "2021-04-09T15:45:15", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:16:22.236Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }