- Description
- The RebornCore library before 4.7.3 allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of reborncore.common.network.ExtendedPacketBuffer. An attacker can instantiate any class on the classpath with any data. A class usable for exploitation might or might not be present, depending on what Minecraft modifications are installed.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-502
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:minecraft:minecraft:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "8D7B27EC-B06B-4D24-B15C-07A86BC95A2E"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DB031ED5-7EA7-4EA0-A261-E022E1EF5477",
"versionEndIncluding": "3.13.8"
},
{
"criteria": "cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3278956C-6797-48E5-9B15-16FA1DF3D8A8",
"versionEndExcluding": "3.19.5",
"versionStartIncluding": "3.19.0"
},
{
"criteria": "cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BC86AE4F-8096-4E89-8DF3-887A997A8196",
"versionEndExcluding": "4.2.10",
"versionStartIncluding": "4.2.0"
},
{
"criteria": "cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1443CC3B-4EB8-44FF-85F3-C81407D89DAC",
"versionEndExcluding": "4.7.3",
"versionStartIncluding": "4.7.0"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]