CVE-2021-33790

9.8 CRITICAL

📋 TL;DR

CVE-2021-33790 is a critical deserialization vulnerability in the RebornCore library for Minecraft mods that allows remote code execution. Attackers can exploit this by sending specially crafted network packets to execute arbitrary code on affected servers. This affects Minecraft servers running mods that include vulnerable versions of RebornCore.

💻 Affected Systems

Products:
  • RebornCore library
  • Minecraft mods that depend on RebornCore
Versions: All versions before 4.7.3
Operating Systems: All operating systems running Minecraft with affected mods
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires specific classes to be present on classpath for exploitation, which depends on installed Minecraft mods.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise allowing attacker to execute arbitrary commands, install malware, steal data, or use the server as part of a botnet.

🟠

Likely Case

Server takeover leading to data theft, disruption of gameplay, or installation of cryptocurrency miners.

🟢

If Mitigated

Limited impact if proper network segmentation and least privilege principles are implemented, though RCE would still be possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the Minecraft server port (default 25565). The advisory includes technical details that could be used to create exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.7.3 and later

Vendor Advisory: https://github.com/TechReborn/RebornCore/security/advisories/GHSA-r7pg-4xrf-7mrm

Restart Required: Yes

Instructions:

1. Update RebornCore to version 4.7.3 or later. 2. Update any mods that depend on RebornCore. 3. Restart the Minecraft server.

🔧 Temporary Workarounds

Network isolation

all

Restrict network access to Minecraft server port (default 25565) to trusted networks only

firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="TRUSTED_NETWORK" port protocol="tcp" port="25565" accept'
netsh advfirewall firewall add rule name="Minecraft" dir=in action=allow protocol=TCP localport=25565 remoteip=TRUSTED_NETWORK

🧯 If You Can't Patch

  • Isolate the Minecraft server in a separate network segment with strict firewall rules
  • Monitor network traffic to Minecraft port for unusual patterns and implement rate limiting

🔍 How to Verify

Check if Vulnerable:

Check RebornCore version in mods folder or server logs. If version is below 4.7.3, system is vulnerable.

Check Version:

grep -i reborncore server.log | grep -i version OR check mods/RebornCore-*.jar file version

Verify Fix Applied:

Confirm RebornCore version is 4.7.3 or higher in server logs or mods folder.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Java exceptions related to deserialization
  • Unexpected class loading in server logs
  • Network errors from ExtendedPacketBuffer

Network Indicators:

  • Unusual traffic patterns to Minecraft port 25565
  • Malformed network packets to Minecraft server

SIEM Query:

source="minecraft.log" AND ("ExtendedPacketBuffer" OR "ObjectInputStream" OR "readObject")

🔗 References

📤 Share & Export