CVE-2024-35237

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-35237
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-35237.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-35237
Aliases
  • GHSA-h8r9-7r8x-78v6
Published
2024-05-27T17:15:10Z
Modified
2024-05-28T12:39:28Z
Summary
[none]
Details

MIT IdentiBot is an open-source Discord bot written in Node.js that verifies individuals' affiliations with MIT, grants them roles in a Discord server, and stores information about them in a database backend. A vulnerability that exists prior to commit 48e3e5e7ead6777fa75d57c7711c8e55b501c24e impacts all users who have performed verification with an instance of MIT IdentiBot that meets the following conditions: The instance of IdentiBot is tied to a "public" Discord application—i.e., users other than the API access registrant can add it to servers; and the instance has not yet been patched. In affected versions, IdentiBot does not check that a server is authorized before allowing members to execute slash and user commands in that server. As a result, any user can join IdentiBot to their server and then use commands (e.g., /kerbid) to reveal the full name and other information about a Discord user who has verified their affiliation with MIT using IdentiBot. The latest version of MIT IdentiBot contains a patch for this vulnerability (implemented in commit 48e3e5e7ead6777fa75d57c7711c8e55b501c24e). There is no way to prevent exploitation of the vulnerability without the patch. To prevent exploitation of the vulnerability, all vulnerable instances of IdentiBot should be taken offline until they have been updated.

References

Affected packages

Git / github.com/zelnickb/mit-identibot

Affected ranges

Type
GIT
Repo
https://github.com/zelnickb/mit-identibot
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed