CVE-2021-29461

Discord Recon Server is a bot that allows one to do one's reconnaissance process from one's Discord. A vulnerability in Discord Recon Server prior to 0.0.3 could be exploited to read internal files from the system and write files into the system resulting in remote code execution. This issue has been fixed in version 0.0.3. As a workaround, one may copy the code from `assets/CommandInjection.py` in the Discord Recon Server code repository and overwrite vulnerable code from one's own Discord Recon Server implementation with code that contains the patch.
Configurations

Configuration 1 (hide)

cpe:2.3:a:demon1a:discord-recon:0.0.2:*:*:*:*:*:*:*

History

12 Jan 2024, 15:05

Type Values Removed Values Added
First Time Demon1a discord-recon
Demon1a
CPE cpe:2.3:a:discord-recon_project:discord-recon:0.0.2:*:*:*:*:*:*:* cpe:2.3:a:demon1a:discord-recon:0.0.2:*:*:*:*:*:*:*

25 Apr 2022, 20:26

Type Values Removed Values Added
CWE CWE-94 CWE-88

07 Jun 2021, 12:15

Type Values Removed Values Added
Summary ### Impact - This issue could be exploited to read internal files from the system and write files into the system resulting in remote code execution ### Patches - This issue has been fixed on 0.0.3 version by adding a regex that validate if there's any arguments on the command. then disallow execution if there's an argument ### Workarounds - To fix this issue from your side, just upgrade discord-recon, if you're unable to do that. then just copy the code from `assets/CommandInjection.py` and overwrite your code with the new one. that's the only code required. ### Credits - All of the credits for finding these issues on discord-recon goes to Omar Badran. ### For more information If you have any questions or comments about this advisory: * Email us at [mdaif1332@gmail.com](mailto:mdaif1332@gmail.com) Discord Recon Server is a bot that allows one to do one's reconnaissance process from one's Discord. A vulnerability in Discord Recon Server prior to 0.0.3 could be exploited to read internal files from the system and write files into the system resulting in remote code execution. This issue has been fixed in version 0.0.3. As a workaround, one may copy the code from `assets/CommandInjection.py` in the Discord Recon Server code repository and overwrite vulnerable code from one's own Discord Recon Server implementation with code that contains the patch.

30 Apr 2021, 17:27

Type Values Removed Values Added
CPE cpe:2.3:a:discord-recon_project:discord-recon:0.0.2:*:*:*:*:*:*:*
References (CONFIRM) https://github.com/DEMON1A/Discord-Recon/security/advisories/GHSA-3m9v-v33c-g83x - (CONFIRM) https://github.com/DEMON1A/Discord-Recon/security/advisories/GHSA-3m9v-v33c-g83x - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 9.0
v3 : 8.8

20 Apr 2021, 20:17

Type Values Removed Values Added
New CVE

Information

Published : 2021-04-20 20:15

Updated : 2024-01-12 15:05


NVD link : CVE-2021-29461

Mitre link : CVE-2021-29461

CVE.ORG link : CVE-2021-29461


JSON object : View

Products Affected

demon1a

  • discord-recon
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')