![]() ![]() This is a vulnerability in mods using unsafe deserialization code, not in Forge itself. While a lot of them are playing on console and so not susceptible to Windows malware, a huge modding base exists in PC land.įrom the Minecraft security (MMPA) article highlighting details of the attack:īleedingPipe is an exploit being used in the wild allowing FULL remote code execution on clients and servers running popular Minecraft mods on 1.7.10/1.12.2 Forge (other versions could also be affected), alongside some other mods. ![]() Given that Minecraft has around 140 million monthly active players, this isn’t great news. They exploit the issues residing in the mods used by the people playing, which permits them to make malicious installations on their PCs. With the server taken over, attackers can then turn their attention to the players inhabiting those servers. As Bleeping Computer notes, the compromised servers are only the first link in the chain. The problem is that so many of them have been set up in a way which allows for this vulnerability to take hold. There’s a custom game type or world state for everybody. Minecraft modding is immensely popular, with a potentially huge number of servers in the wild doing their own thing. The vulnerability, named BleedingPipe, allows attackers to take over a targeted server. A Remote Code Execution (RCE) vulnerability in certain Minecraft mods allows for malicious commands on both servers and clients. Minecraft players interested in modding are potentially at risk of compromise. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |