9.8
CVE-2021-33790
- EPSS 5.43%
- Veröffentlicht 31.05.2021 04:15:08
- Zuletzt bearbeitet 21.11.2024 06:09:35
- Quelle cve@mitre.org
- CVE-Watchlists
- Unerledigt
The RebornCore library before 4.7.3 allows remote code execution because it deserializes untrusted data in ObjectInputStream.readObject as part of reborncore.common.network.ExtendedPacketBuffer. An attacker can instantiate any class on the classpath with any data. A class usable for exploitation might or might not be present, depending on what Minecraft modifications are installed.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Techreborn ≫ Reborncore Version <= 3.13.8
Techreborn ≫ Reborncore Version >= 3.19.0 < 3.19.5
Techreborn ≫ Reborncore Version >= 4.2.0 < 4.2.10
Techreborn ≫ Reborncore Version >= 4.7.0 < 4.7.3
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 5.43% | 0.891 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.