Before 2.6.3
As a user, do the following:
//pos1
//pos2 Infinity
The steps 1 and 2 are interchangeable.
Such a task has a possibility of bringing the performing server down.
This issue was discovered and reported by @SuperMonis.
On June 12, 2023, a patch, https://github.com/IntellectualSites/FastAsyncWorldEdit/pull/2285, has been merged addressing the vulnerability. We strongly recommend users to update their version of FastAsyncWorldEdit to 2.6.3 as soon as possible.
There is no direct mitigation besides updating FastAsyncWorldEdit to a patched version.
Users with access to the logs/
folder or shell access on their server can try to identify possible abuses of this issue by going through the logs.
To sieve through the data, you can use the regex query \/\/pos[12] Infinity
, then investigate all log entries that return results.
If you discover a security vulnerability within our software, please report the issue according to our vulnerability disclosure policy.
{ "nvd_published_at": "2023-06-23T16:15:09Z", "cwe_ids": [ "CWE-400" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-06-22T20:00:36Z" }