The BleedingPipe RCE Exploit Presents Minecraft With a New Security Challenge

 

‘BleedingPipe’ is actively exploited by hackers to execute malicious commands on servers and clients running Minecraft mods. This is to take advantage of the remote code execution vulnerability. By doing this, they can gain control over the devices and make them work as they want. 
There is a vulnerability known as BleedingPipe, which can be found in many Minecraft mods because the wrong way the ‘ObjectInputStream’ class is used to deserialize is implemented in Java, which leads to BleedingPipe Servers and clients using this to exchange packets of information between each other over the network. Attackers tamper with Minecraft mod servers by sending specially crafted network packets to them to take control of the servers. 
As a result of a newly discovered security vulnerability, Minecraft Java Edition players and server owners have been able to execute code remotely on their computers caused by bad actors. Because the exploit takes advantage of Java’s deserialization mechanism, you will likely be affected if you run one of the many popular mods that are susceptible to it. This is also true if you play on a server with them installed. 
In addition to AetherCraft, Immersive Armor, CreativeCore, ttCore, and many other popular Minecraft mods, several other vulnerabilities affect Minecraft. The following GitHub user dogboy21 has compiled a

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: