Vulnerability Description
Discord-Recon is a bot for the Discord chat service. In versions of Discord-Recon 0.0.3 and prior, a remote attacker is able to read local files from the server that can disclose important information. As a workaround, a bot maintainer can locate the file `app.py` and add `.replace('..', '')` into the `Path` variable inside of the `recon` function. The vulnerability is patched in version 0.0.4.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Discord | Discord-Recon | < 0.0.4 |
Related Weaknesses (CWE)
References
- https://github.com/DEMON1A/Discord-Recon/security/advisories/GHSA-p2pw-8xwf-879gMitigationThird Party Advisory
- https://github.com/DEMON1A/Discord-Recon/security/advisories/GHSA-p2pw-8xwf-879gMitigationThird Party Advisory
FAQ
What is CVE-2021-29466?
CVE-2021-29466 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Discord-Recon is a bot for the Discord chat service. In versions of Discord-Recon 0.0.3 and prior, a remote attacker is able to read local files from the server that can disclose important information...
How severe is CVE-2021-29466?
CVE-2021-29466 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-29466?
Check the references section above for vendor advisories and patch information. Affected products include: Discord Discord-Recon.