Miggo Logo

CVE-2020-15140: Remote Code Execution in Red Discord Bot

8.2

CVSS Score
3.1

Basic Information

EPSS Score
0.51174%
Published
8/21/2020
Updated
10/25/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
Red-DiscordBotpip< 3.3.113.3.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The critical fix in commit 9ab5362 shows removal of a .format() call that processed user-controlled member data. As usernames are external input, using .format() on them without proper sanitization creates a format string vulnerability (CWE-74). The patch removed this insecure string formatting, confirming this was the injection vector. The function's role in leaderboard generation matches the vulnerability description of username-based code injection.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t * R** *xploit **s ***n *is*ov*r** in t** Trivi* mo*ul*: t*is *xploit *llows *is*or* us*rs wit* sp**i*i**lly *r**t** us*rn*m*s to inj**t *o** into t** Trivi* mo*ul*'s l****r*o*r* *omm*n*. *y **usin* t*is *xploit, it's possi*l* to p*r*orm **

Reasoning

T** *riti**l *ix in *ommit ******* s*ows r*mov*l o* * `.*orm*t()` **ll t**t pro**ss** us*r-*ontroll** m*m**r **t*. *s us*rn*m*s *r* *xt*rn*l input, usin* `.*orm*t()` on t**m wit*out prop*r s*nitiz*tion *r**t*s * *orm*t strin* vuln*r**ility (*W*-**).