CVE-2023-30859

Triton is a Minecraft plugin for Spigot and BungeeCord that helps you translate your Minecraft server. The CustomPayload packet allows you to execute commands on the spigot/bukkit console. When you enable bungee mode in the config it will enable the bungee bridge and the server will begin to broadcast the 'triton:main' plugin channel. Using this plugin channel you are able to send a payload packet containing a byte (2) and a string (any spigot command). This could be used to make yourself a server operator and be used to extract other user information through phishing (pretending to be an admin), many servers use essentials so the /geoip command could be available to them, etc. This could also be modified to allow you to set the servers language, set another players language, etc. This issue affects those who have bungee enabled in config. This issue has been fixed in version 3.8.4.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:triton_project:triton:*:*:*:*:*:*:*:*
cpe:2.3:a:triton_project:triton:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:00

Type Values Removed Values Added
References () https://github.com/tritonmc/Triton/releases/tag/v3.8.4 - Release Notes () https://github.com/tritonmc/Triton/releases/tag/v3.8.4 - Release Notes
References () https://github.com/tritonmc/Triton/security/advisories/GHSA-8vj5-jccf-q25r - Exploit, Vendor Advisory () https://github.com/tritonmc/Triton/security/advisories/GHSA-8vj5-jccf-q25r - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 7.2

09 May 2023, 19:01

Type Values Removed Values Added
CPE cpe:2.3:a:triton_project:triton:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-419 NVD-CWE-noinfo
References (MISC) https://github.com/tritonmc/Triton/releases/tag/v3.8.4 - (MISC) https://github.com/tritonmc/Triton/releases/tag/v3.8.4 - Release Notes
References (MISC) https://github.com/tritonmc/Triton/security/advisories/GHSA-8vj5-jccf-q25r - (MISC) https://github.com/tritonmc/Triton/security/advisories/GHSA-8vj5-jccf-q25r - Exploit, Vendor Advisory

01 May 2023, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-01 14:15

Updated : 2024-11-21 08:00


NVD link : CVE-2023-30859

Mitre link : CVE-2023-30859

CVE.ORG link : CVE-2023-30859


JSON object : View

Products Affected

triton_project

  • triton
CWE
CWE-419

Unprotected Primary Channel

NVD-CWE-noinfo