漏洞信息
# CommandKit 命令别名上下文错误
N/A
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
CommandKit exposes incorrect command name in context object for message command aliases
漏洞描述信息
CommandKit is the discord.js meta-framework for building Discord bots. In versions 1.2.0-rc.1 through 1.2.0-rc.11, a logic flaw exists in the message command handler that affects how the commandName property is exposed to both middleware functions and command execution contexts when handling command aliases. When a message command is invoked using an alias, the ctx.commandName value reflects the alias rather than the canonical command name. This occurs in both middleware functions and within the command's own run function. Although not explicitly documented, CommandKit's examples and guidance around middleware usage implicitly convey that ctx.commandName represents the canonical command identifier. Middleware examples in the documentation consistently use ctx.commandName to reference the command being executed. Developers who assume ctx.commandName is canonical may introduce unintended behavior when relying on it for logic such as permission checks, rate limiting, or audit logging. This could allow unauthorized command execution or inaccurate access control decisions. Slash commands and context menu commands are not affected. This issue has been patched in version 1.2.0-rc.12, where ctx.commandName now consistently returns the actual canonical command name regardless of the alias used to invoke it.
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
漏洞类别
使用不正确的解析名称或索引
漏洞标题
commandKit 安全漏洞
漏洞描述信息
commandKit是Under Ctrl开源的一个构建Discord机器人的开发工具。 commandKit 1.2.0-rc.1版本至1.2.0-rc.11版本存在安全漏洞,该漏洞源于消息命令处理程序中存在逻辑缺陷,可能导致未经授权的命令执行或不准确的访问控制决策。
CVSS信息
N/A
漏洞类别
其他