← Back to CVEs
CVE-2021-33790
CRITICAL9.8
Description
The RebornCore library before 4.7.3 allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of reborncore.common.network.ExtendedPacketBuffer. An attacker can instantiate any class on the classpath with any data. A class usable for exploitation might or might not be present, depending on what Minecraft modifications are installed.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published5/31/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
minecraft:minecrafttechreborn:reborncore
Weaknesses (CWE)
CWE-502
References
https://vuln.ryotak.me/advisories/45(cve@mitre.org)
https://www.curseforge.com/minecraft/mc-mods/reborncore(cve@mitre.org)
https://github.com/TechReborn/RebornCore/security/advisories/GHSA-r7pg-4xrf-7mrm(af854a3a-2127-422b-91ae-364da2661108)
https://vuln.ryotak.me/advisories/45(af854a3a-2127-422b-91ae-364da2661108)
https://www.curseforge.com/minecraft/mc-mods/reborncore(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.