First published: Thu Apr 22 2021(Updated: )
Discord-Recon is a bot for the Discord chat service. Versions of Discord-Recon 0.0.3 and prior contain a vulnerability in which a remote attacker is able to overwrite any file on the system with the command results. This can result in remote code execution when the user overwrite important files on the system. As a workaround, bot maintainers can edit their `setting.py` file then add `<` and `>` into the `RCE` variable inside of it to fix the issue without an update. The vulnerability is patched in version 0.0.4.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Discord | <0.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29465 has been classified as having a high severity due to the potential for remote code execution.
To mitigate CVE-2021-29465, upgrade Discord-Recon to version 0.0.4 or later.
CVE-2021-29465 affects Discord-Recon version 0.0.3 and prior.
Yes, CVE-2021-29465 can lead to data loss by allowing an attacker to overwrite files on the affected system.
No, using Discord-Recon versions older than 0.0.4 presents a significant security risk due to CVE-2021-29465.