SudoBot, a Discord moderation bot, is vulnerable to privilege escalation and exploit of the -config
command in versions prior to 9.26.7. Anyone is theoretically able to update any configuration of the bot and potentially gain control over the bots settings. Every version of v9 before v9.26.7 is affected. Other versions (e.g. v8) are not affected. Users should upgrade to version 9.26.7 to receive a patch. A workaround would be to create a command permission overwrite in the Database. A SQL statement provided in the GitHub Security Advisor can be executed to create a overwrite that disallows users without ManageGuild
permission to run the -config
command. Run the SQL statement for every server the bot is in, and replace <guild_id>
with the appropriate Guild ID each time.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Sudobot | Onesoftnet | 9.0.0 (including) | 9.26.7 (excluding) |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied, users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.