CVE-2021-33790

The RebornCore library before 4.7.3 allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of reborncore.common.network.ExtendedPacketBuffer. An attacker can instantiate any class on the classpath with any data. A class usable for exploitation might or might not be present, depending on what Minecraft modifications are installed.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*
cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*
cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*
cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*
cpe:2.3:a:minecraft:minecraft:-:*:*:*:*:*:*:*

Information

Published : 2021-05-30 21:15

Updated : 2021-06-11 12:38


NVD link : CVE-2021-33790

Mitre link : CVE-2021-33790


JSON object : View

CWE
CWE-502

Deserialization of Untrusted Data

Advertisement

dedicated server usa

Products Affected

minecraft

  • minecraft

techreborn

  • reborncore