Description
In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg.
Published: 2020-10-13
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-0182 In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability. This plugin is bundled with MirahezeBot-Plugins with versions from 9.0.0 and less than 9.0.2 affected. Version 9.0.2 includes 1.0.3 of channelmgnt, and thus is safe from this vulnerability. See referenced GHSA-23pc-4339-95vg.
Github GHSA Github GHSA GHSA-j257-jfvv-h3x5 Privilege Escalation in Channelmgnt plug-in for Sopel
History

No history.

Subscriptions

Mirahezebots Channelmgnt
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-04T13:08:23.235Z

Reserved: 2020-06-25T00:00:00.000Z

Link: CVE-2020-15251

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-13T18:15:12.780

Modified: 2024-11-21T05:05:11.727

Link: CVE-2020-15251

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses