Lucene search

K
cve[email protected]CVE-2021-37632
HistoryAug 05, 2021 - 9:15 p.m.

CVE-2021-37632

2021-08-0521:15:12
CWE-502
web.nvd.nist.gov
38
supermartijn642's config lib
minecraft
vulnerability
remote code execution
exploit
patch
nvd

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

78.7%

SuperMartijn642’s Config Lib is a library used by a number of mods for the game Minecraft. The versions of SuperMartijn642’s Config Lib between 1.0.4 and 1.0.8 are affected by a vulnerability and can be exploited on both servers and clients. Using SuperMartijn642’s Config Lib, servers will send a packet to clients with the server’s config values. In order to read enum values from the packet data, ObjectInputStream#readObject is used. ObjectInputStream#readObject will instantiate a class based on the input data. Since, the packet data is not validated before ObjectInputStream#readObject is called, an attacker can instantiate any class by sending a malicious packet. If a suitable class is found, the vulnerability can lead to a number of exploits, including remote code execution. Although the vulnerable packet is typically only send from server to client, it can theoretically also be send from client to server. This means both clients and servers running SuperMartijn642’s Config Lib between 1.0.4 and 1.0.8 are vulnerable. The vulnerability has been patched in SuperMartijn642’s Config lib 1.0.9. Both, players and server owners, should update to 1.0.9 or higher.

Affected configurations

Vulners
NVD
Node
supermartijn642supermartijn642sconfiglibRange1.0.41.0.8

CNA Affected

[
  {
    "product": "SuperMartijn642sConfigLib",
    "vendor": "SuperMartijn642",
    "versions": [
      {
        "status": "affected",
        "version": ">= 1.0.4, < 1.0.8"
      }
    ]
  }
]

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.006 Low

EPSS

Percentile

78.7%

Related for CVE-2021-37632