CVE-2023-38689

Logistics Pipes is a modification (a.k.a. mod) for the computer game Minecraft Java Edition. The mod used Java's `ObjectInputStream#readObject` on untrusted data coming from clients or servers over the network resulting in possible remote code execution when sending specifically crafted network packets after connecting. The affected versions were released between 2013 and 2016 and the issue (back then unknown) was fixed in 2016 by a refactoring of the network IO code. The issue is present in all Logistics Pipes versions ranged from 0.7.0.91 prior to 0.10.0.71, which were downloaded from different platforms summing up to multi-million downloads. For Minecraft version 1.7.10 the issue was fixed in build 0.10.0.71. Everybody on Minecraft 1.7.10 should check their version number of Logistics Pipes in their modlist and update, if the version number is smaller than 0.10.0.71. Any newer supported Minecraft version (like 1.12.2) never had a Logistics Pipes version with vulnerable code. The best available workaround for vulnerable versions is to play in singleplayer only or update to newer Minecraft versions and modpacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rs485:logisticspipes:*:*:*:*:*:minecraft:*:*

History

21 Nov 2024, 08:14

Type Values Removed Values Added
Summary
  • (es) "Logistics Pipes es una modificación (también conocida como mod) para el juego de ordenador Minecraft Java Edition. El mod utilizaba Java's `ObjectInputStream#readObject` en datos no fiables procedentes de clientes o servidores a través de la red, lo que resultaba en una posible ejecución remota de código al enviar paquetes de red específicamente diseñados después de conectarse. Las versiones afectadas se publicaron entre 2013 y 2016 y el problema (entonces desconocido) se solucionó en 2016 mediante una refactorización del código de E/S de red. El problema está presente en todas las versiones de Logistics Pipes, desde la 0.7.0.91 hasta la 0.10.0.71, que se descargaron desde diferentes plataformas y que suman varios millones de descargas. Para Minecraft versión 1.7.10 el problema se solucionó en la versión 0.10.0.71. Todo el mundo en Minecraft 1.7.10 debe comprobar su número de versión de Logística Tuberías en su lista de mods y actualización, si el número de versión es menor que 0.10.0.71. Cualquier versión más reciente de Minecraft compatible (como 1.12.2) nunca tuvo una versión de Logistics Pipes con código vulnerable. La mejor solución disponible para las versiones vulnerables es jugar en un solo jugador o actualizar a nuevas versiones de Minecraft y modpacks."
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.1
References () https://github.com/RS485/LogisticsPipes/commit/39a90b8f2d1a2bcc512ec68c3e139f1dac07aa56 - Patch () https://github.com/RS485/LogisticsPipes/commit/39a90b8f2d1a2bcc512ec68c3e139f1dac07aa56 - Patch
References () https://github.com/RS485/LogisticsPipes/commit/527c4f4fb028e9afab29d4e639935010ad7be9e7 - Product () https://github.com/RS485/LogisticsPipes/commit/527c4f4fb028e9afab29d4e639935010ad7be9e7 - Product
References () https://github.com/RS485/LogisticsPipes/security/advisories/GHSA-mcp7-xf3v-25x3 - Mitigation, Patch, Vendor Advisory () https://github.com/RS485/LogisticsPipes/security/advisories/GHSA-mcp7-xf3v-25x3 - Mitigation, Patch, Vendor Advisory

11 Aug 2023, 21:03

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:rs485:logisticspipes:*:*:*:*:*:minecraft:*:*
References (MISC) https://github.com/RS485/LogisticsPipes/security/advisories/GHSA-mcp7-xf3v-25x3 - (MISC) https://github.com/RS485/LogisticsPipes/security/advisories/GHSA-mcp7-xf3v-25x3 - Mitigation, Patch, Vendor Advisory
References (MISC) https://github.com/RS485/LogisticsPipes/commit/527c4f4fb028e9afab29d4e639935010ad7be9e7 - (MISC) https://github.com/RS485/LogisticsPipes/commit/527c4f4fb028e9afab29d4e639935010ad7be9e7 - Product
References (MISC) https://github.com/RS485/LogisticsPipes/commit/39a90b8f2d1a2bcc512ec68c3e139f1dac07aa56 - (MISC) https://github.com/RS485/LogisticsPipes/commit/39a90b8f2d1a2bcc512ec68c3e139f1dac07aa56 - Patch

04 Aug 2023, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-04 17:15

Updated : 2024-11-21 08:14


NVD link : CVE-2023-38689

Mitre link : CVE-2023-38689

CVE.ORG link : CVE-2023-38689


JSON object : View

Products Affected

rs485

  • logisticspipes
CWE
CWE-502

Deserialization of Untrusted Data