CVE-2023-7332

N/A Unknown

📋 TL;DR

This vulnerability allows remote attackers with valid player sessions to crash PocketMine-MP game servers by sending malicious inventory transaction requests. The server improperly validates dropped item counts, enabling attackers to request dropping more items than available in their hotbar. This affects all PocketMine-MP servers running versions before 4.18.1.

💻 Affected Systems

Products:
  • PocketMine-MP
Versions: All versions prior to 4.18.1
Operating Systems: All platforms running PocketMine-MP
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The vulnerability requires a valid player session but no special permissions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server denial of service with repeated crashes, disrupting gameplay for all connected players and potentially causing data corruption if crashes occur during critical operations.

🟠

Likely Case

Server crashes resulting in temporary denial of service, requiring manual restart and causing gameplay disruption for all connected players.

🟢

If Mitigated

Minimal impact with proper patching; servers remain stable with normal gameplay functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a valid player session but is trivial to execute once authenticated. Public proof-of-concept exists in advisory references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.18.1

Vendor Advisory: https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-h87r-f4vc-mchv

Restart Required: Yes

Instructions:

1. Stop the PocketMine-MP server. 2. Update to version 4.18.1 or later using the official update method. 3. Restart the server.

🔧 Temporary Workarounds

Session Rate Limiting

all

Implement rate limiting on inventory transactions to reduce the impact of repeated exploitation attempts.

Network Segmentation

all

Restrict server access to trusted players only through whitelisting or VPN requirements.

🧯 If You Can't Patch

  • Implement strict player whitelisting to limit potential attackers
  • Monitor server logs for abnormal inventory transaction patterns and ban suspicious players

🔍 How to Verify

Check if Vulnerable:

Check if PocketMine-MP version is below 4.18.1. Vulnerable if version < 4.18.1.

Check Version:

Run the PocketMine-MP server with --version flag or check server startup logs

Verify Fix Applied:

Confirm PocketMine-MP version is 4.18.1 or higher after update.

📡 Detection & Monitoring

Log Indicators:

  • Server crash logs mentioning inventory transactions
  • Abnormal disconnection patterns
  • Error messages related to item dropping or inventory handling

Network Indicators:

  • Unusually frequent inventory transaction packets from single players
  • Pattern of server crashes following specific player actions

SIEM Query:

Search for 'PocketMine-MP crash' AND 'inventory' OR 'transaction' in server logs

🔗 References

📤 Share & Export