Описание
The RebornCore library before 4.7.3 allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of reborncore.common.network.ExtendedPacketBuffer. An attacker can instantiate any class on the classpath with any data. A class usable for exploitation might or might not be present, depending on what Minecraft modifications are installed.
Ссылки
- Third Party Advisory
- Third Party Advisory
- ProductThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- ProductThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 3.13.8 (включая)Версия от 3.19.0 (включая) до 3.19.5 (исключая)Версия от 4.2.0 (включая) до 4.2.10 (исключая)Версия от 4.7.0 (включая) до 4.7.3 (исключая)
Одновременно
Одно из
cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*
cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*
cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*
cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*
cpe:2.3:a:minecraft:minecraft:-:*:*:*:*:*:*:*
EPSS
Процентиль: 90%
0.05433
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-502
EPSS
Процентиль: 90%
0.05433
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-502