A RCE exploit has been discovered in the Streams module: this exploit allows Discord users with specifically crafted “going live” messages to inject code into the Streams module’s going live message. By abusing this exploit, it’s possible to perform destructive actions and/or access sensitive information.
This critical exploit has been fixed on version 3.3.12
& 3.4
.
Unloading the Streams module with unload streams
can render this exploit not accessible. We still highly recommend updating to 3.3.12
or 3.4
to completely patch this issue.
If you have any questions or comments about this advisory:
github.com/Cog-Creators/Red-DiscordBot
github.com/Cog-Creators/Red-DiscordBot/pull/4183
github.com/Cog-Creators/Red-DiscordBot/pull/4183/commits/e269ea0d3bc88417163c18431b1df38a9be92bfc
github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-7257-96vg-qf6x
nvd.nist.gov/vuln/detail/CVE-2020-15147