Severity: high (7.5)
First published: Thu Sep 14 2023
Last modified: Thu Sep 14 2023
### Impact An attacker could crash the server by sending malformed JWT JSON in `LoginPacket` due to a security vulnerability in [`netresearch/jsonmapper`](https://github.com/cweiske/JsonMapper), due to accepting `NULL` values in arrays whose types do not expect `NULL`. ### Patches This problem was fixed in 5.3.1 and 4.23.1 by updating JsonMapper to include the following commit: pmmp/netresearch-jsonmapper@4f90e8dab1c9df331fad7d3d89823404e882668c ### Workarounds A plugin may handle `DataPacketReceiveEvent` for `LoginPacket` and check that none of the input arrays contain `NULL` where it's not expected, but this is rather cumbersome.
The severity of GHSA-92jh-gwch-jq38 is high with a CVSS score of 7.5.
An attacker can exploit GHSA-92jh-gwch-jq38 by sending malformed JWT JSON in `LoginPacket` to crash the server.
The impacted software for GHSA-92jh-gwch-jq38 is `pocketmine/pocketmine-mp`.
The recommended remedy for GHSA-92jh-gwch-jq38 is to update `pocketmine/pocketmine-mp` to version 4.23.1 or 5.3.1.
You can find more information about GHSA-92jh-gwch-jq38 in the [GitHub Security Advisory](https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-92jh-gwch-jq38).