CVE-2020-15251
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/10/2020
Last modified:
18/11/2021
Description
In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mirahezebots:channelmgnt:*:*:*:*:*:sopel:*:* | 1.0.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg
- https://github.com/MirahezeBots/sopel-channelmgnt/pull/3
- https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5
- https://phab.bots.miraheze.wiki/T117
- https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/
- https://pypi.org/project/sopel-plugins.channelmgnt/



