CVE-2023-22452
Discord Kenny2Automate Server Setting Channel ID Cross-Site Request Forgery (CSRF) Vulnerability
Description
kenny2automate is a Discord bot. In the web interface for server settings, form elements were generated with Discord channel IDs as part of input names. Prior to commit a947d7c, no validation was performed to ensure that the channel IDs submitted actually belonged to the server being configured. Thus anyone who has access to the channel ID they wish to change settings for and the server settings panel for any server could change settings for the requested channel no matter which server it belonged to. Commit a947d7c resolves the issue and has been deployed to the official instance of the bot. The only workaround that exists is to disable the web config entirely by changing it to run on localhost. Note that a workaround is only necessary for those who run their own instance of the bot.
INFO
Published Date :
Jan. 2, 2023, 8:15 p.m.
Last Modified :
Nov. 21, 2024, 7:44 a.m.
Source :
[email protected]
Remotely Exploitable :
Yes !
Impact Score :
3.6
Exploitability Score :
2.8
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2023-22452
.
URL | Resource |
---|---|
https://github.com/Kenny2github/kenny2automate/commit/a947d7ce408687b587c7e6dfd6026f7c4ee31ac2 | Patch Third Party Advisory |
https://github.com/Kenny2github/kenny2automate/security/advisories/GHSA-73j8-xrcr-q6j7 | Patch Third Party Advisory |
https://github.com/Kenny2github/kenny2automate/commit/a947d7ce408687b587c7e6dfd6026f7c4ee31ac2 | Patch Third Party Advisory |
https://github.com/Kenny2github/kenny2automate/security/advisories/GHSA-73j8-xrcr-q6j7 | Patch Third Party Advisory |
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2023-22452
vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2023-22452
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 21, 2024
Action Type Old Value New Value Added Reference https://github.com/Kenny2github/kenny2automate/commit/a947d7ce408687b587c7e6dfd6026f7c4ee31ac2 Added Reference https://github.com/Kenny2github/kenny2automate/security/advisories/GHSA-73j8-xrcr-q6j7 -
CVE Modified by [email protected]
May. 14, 2024
Action Type Old Value New Value -
Initial Analysis by [email protected]
Jan. 09, 2023
Action Type Old Value New Value Added CVSS V3.1 NIST AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N Changed Reference Type https://github.com/Kenny2github/kenny2automate/commit/a947d7ce408687b587c7e6dfd6026f7c4ee31ac2 No Types Assigned https://github.com/Kenny2github/kenny2automate/commit/a947d7ce408687b587c7e6dfd6026f7c4ee31ac2 Patch, Third Party Advisory Changed Reference Type https://github.com/Kenny2github/kenny2automate/security/advisories/GHSA-73j8-xrcr-q6j7 No Types Assigned https://github.com/Kenny2github/kenny2automate/security/advisories/GHSA-73j8-xrcr-q6j7 Patch, Third Party Advisory Added CPE Configuration OR *cpe:2.3:a:kenny2automate_project:kenny2automate:*:*:*:*:*:*:*:* versions up to (excluding) a947d7c
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2023-22452
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2023-22452
weaknesses.
Exploit Prediction
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.
0.06 }} -0.04%
score
0.15598
percentile