// For flags

CVE-2021-29465

Remote file overwrite on discord-recon can result in DoS and Remote Code Execution

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Discord-Recon is a bot for the Discord chat service. Versions of Discord-Recon 0.0.3 and prior contain a vulnerability in which a remote attacker is able to overwrite any file on the system with the command results. This can result in remote code execution when the user overwrite important files on the system. As a workaround, bot maintainers can edit their `setting.py` file then add `<` and `>` into the `RCE` variable inside of it to fix the issue without an update. The vulnerability is patched in version 0.0.4.

Discord-Recon es un bot para el servicio de chat Discord.&#xa0;Unas versiones de Discord-Recon versiones 0.0.3 y anteriores, contienen una vulnerabilidad en la que un atacante remoto puede sobrescribir cualquier archivo del sistema con los resultados del comando.&#xa0;Esto puede resultar en la ejecución de código remota cuando el usuario sobrescribe archivos importantes en el sistema.&#xa0;Como solución alternativa, los encargados de mantenimiento de bots pueden editar su archivo "setting.py" y luego agregar" ("y") "en la variable" RCE" dentro de él para solucionar el problema sin una actualización.&#xa0;La vulnerabilidad está parcheada en la versión 0.0.4

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-03-30 CVE Reserved
  • 2021-04-22 CVE Published
  • 2024-08-03 CVE Updated
  • 2024-08-25 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Discord
Search vendor "Discord"
Discord-recon
Search vendor "Discord" for product "Discord-recon"
< 0.0.4
Search vendor "Discord" for product "Discord-recon" and version " < 0.0.4"
-
Affected