CVE-2021-33790

The RebornCore library before 4.7.3 allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of reborncore.common.network.ExtendedPacketBuffer. An attacker can instantiate any class on the classpath with any data. A class usable for exploitation might or might not be present, depending on what Minecraft modifications are installed.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:minecraft:minecraft:-:*:*:*:*:*:*:*
OR cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*
cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*
cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*
cpe:2.3:a:techreborn:reborncore:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-05-31 04:15

Updated : 2021-06-11 19:38


NVD link : CVE-2021-33790

Mitre link : CVE-2021-33790

CVE.ORG link : CVE-2021-33790


JSON object : View

Products Affected

minecraft

  • minecraft

techreborn

  • reborncore
CWE
CWE-502

Deserialization of Untrusted Data