Description
The RebornCore library before 4.7.3 allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of reborncore.common.network.ExtendedPacketBuffer. An attacker can instantiate any class on the classpath with any data. A class usable for exploitation might or might not be present, depending on what Minecraft modifications are installed.
Published: 2021-05-31
Score: 9.8 Critical
EPSS: 5.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-20467 The RebornCore library before 4.7.3 allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of reborncore.common.network.ExtendedPacketBuffer. An attacker can instantiate any class on the classpath with any data. A class usable for exploitation might or might not be present, depending on what Minecraft modifications are installed.
History

No history.

Subscriptions

Minecraft Minecraft
Techreborn Reborncore
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T23:58:23.179Z

Reserved: 2021-05-30T00:00:00.000Z

Link: CVE-2021-33790

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-31T04:15:08.153

Modified: 2024-11-21T06:09:35.270

Link: CVE-2021-33790

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses