Description
The RebornCore library before 4.7.3 allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of reborncore.common.network.ExtendedPacketBuffer. An attacker can instantiate any class on the classpath with any data. A class usable for exploitation might or might not be present, depending on what Minecraft modifications are installed.
References
https://github.com/TechReborn/RebornCore/security/advisories/GHSA-r7pg-4xrf-7mrm
https://vuln.ryotak.me/advisories/45
https://www.curseforge.com/minecraft/mc-mods/reborncore
https://github.com/TechReborn/RebornCore/security/advisories/GHSA-r7pg-4xrf-7mrm
https://vuln.ryotak.me/advisories/45
https://www.curseforge.com/minecraft/mc-mods/reborncore
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2021-05-31T02:15:08.153Z
4 years agoLast modified
2024-11-21T05:09:35.270Z
1 year ago