Logo
vuln-group

GHSA-92jh-gwch-jq38

Severity: high (7.5)

First published: Thu Sep 14 2023

Last modified: Thu Sep 14 2023

### Impact An attacker could crash the server by sending malformed JWT JSON in `LoginPacket` due to a security vulnerability in [`netresearch/jsonmapper`](https://github.com/cweiske/JsonMapper), due to accepting `NULL` values in arrays whose types do not expect `NULL`. ### Patches This problem was fixed in 5.3.1 and 4.23.1 by updating JsonMapper to include the following commit: pmmp/netresearch-jsonmapper@4f90e8dab1c9df331fad7d3d89823404e882668c ### Workarounds A plugin may handle `DataPacketReceiveEvent` for `LoginPacket` and check that none of the input arrays contain `NULL` where it's not expected, but this is rather cumbersome.

Any of

  • composer/pocketmine/pocketmine-mp
    <=4.23.0
    fixed in: 4.23.1
  • composer/pocketmine/pocketmine-mp
    >=5.0.0<=5.3.0
    fixed in: 5.3.1

FAQ

  • What is the severity of GHSA-92jh-gwch-jq38?

    The severity of GHSA-92jh-gwch-jq38 is high with a CVSS score of 7.5.

  • How can an attacker exploit GHSA-92jh-gwch-jq38?

    An attacker can exploit GHSA-92jh-gwch-jq38 by sending malformed JWT JSON in `LoginPacket` to crash the server.

  • What is the impacted software for GHSA-92jh-gwch-jq38?

    The impacted software for GHSA-92jh-gwch-jq38 is `pocketmine/pocketmine-mp`.

  • What is the recommended remedy for GHSA-92jh-gwch-jq38?

    The recommended remedy for GHSA-92jh-gwch-jq38 is to update `pocketmine/pocketmine-mp` to version 4.23.1 or 5.3.1.

  • Where can I find more information about GHSA-92jh-gwch-jq38?

    You can find more information about GHSA-92jh-gwch-jq38 in the [GitHub Security Advisory](https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-92jh-gwch-jq38).

SecAlerts Pty Ltd.
Fortitude Valley,
QLD 4006, Australia
© Copyright 2023 - ABN: 70 645 966 203, ACN: 645 966 203