PYSEC-2020-266

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/red-discordbot/PYSEC-2020-266.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2020-266
Aliases
Published
2020-08-21T18:15:00Z
Modified
2026-02-22T22:49:33.801911Z
Summary
[none]
Details

Red Discord Bot before versions 3.3.12 and 3.4 has a Remote Code Execution vulnerability in the Streams module. This exploit allows Discord users with specifically crafted "going live" messages to inject code into the Streams module's going live message. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. As a workaround, unloading the Trivia module with unload streams can render this exploit not accessible. It is highly recommended updating to 3.3.12 or 3.4 to completely patch this issue.

References

Affected packages

PyPI / red-discordbot

Package

Affected ranges

Type
GIT
Repo
https://github.com/Cog-Creators/Red-DiscordBot
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.3.12

Affected versions

3.*
3.0.0b16
3.0.0b17
3.0.0b18
3.0.0b19
3.0.0b20
3.0.0b21
3.0.0rc1
3.0.0rc1.post1
3.0.0rc2
3.0.0rc3
3.0.0rc3.post1
3.0.0
3.0.1
3.0.2
3.1.0
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
3.1.7
3.1.8
3.1.9
3.2.0
3.2.1
3.2.2
3.2.3
3.3.0
3.3.1
3.3.2
3.3.3
3.3.4
3.3.5
3.3.6
3.3.7
3.3.8
3.3.9
3.3.10
3.3.11

Database specific

source
"https://github.com/pypa/advisory-database/blob/main/vulns/red-discordbot/PYSEC-2020-266.yaml"