The RebornCore library before 4.7.3 allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of reborncore.common.network.ExtendedPacketBuffer. An attacker can instantiate any class on the classpath with any data. A class usable for exploitation might or might not be present, depending on what Minecraft modifications are installed.
References
Link | Resource |
---|---|
https://github.com/TechReborn/RebornCore/security/advisories/GHSA-r7pg-4xrf-7mrm | Third Party Advisory |
https://vuln.ryotak.me/advisories/45 | Third Party Advisory |
https://www.curseforge.com/minecraft/mc-mods/reborncore | Product Third Party Advisory |
https://github.com/TechReborn/RebornCore/security/advisories/GHSA-r7pg-4xrf-7mrm | Third Party Advisory |
https://vuln.ryotak.me/advisories/45 | Third Party Advisory |
https://www.curseforge.com/minecraft/mc-mods/reborncore | Product Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/TechReborn/RebornCore/security/advisories/GHSA-r7pg-4xrf-7mrm - Third Party Advisory | |
References | () https://vuln.ryotak.me/advisories/45 - Third Party Advisory | |
References | () https://www.curseforge.com/minecraft/mc-mods/reborncore - Product, Third Party Advisory |
Information
Published : 2021-05-31 04:15
Updated : 2024-11-21 06:09
NVD link : CVE-2021-33790
Mitre link : CVE-2021-33790
CVE.ORG link : CVE-2021-33790
JSON object : View
Products Affected
techreborn
- reborncore
minecraft
- minecraft
CWE
CWE-502
Deserialization of Untrusted Data