DyeColorIdMap->fromId()
did not account for the possibility that it might be given invalid input. This means that an undefined offset error would occur whenever this happened.
This code is indirectly called during Banner->deserializeCompoundTag()
, which is invoked when deserializing any item NBT, whether from network or disk.
An attacker could use this bug to crash a server by providing NBT with invalid values for pattern colours in an inventory transaction, or by using /give
to obtain an item with NBT like this.
08b9495bce2d65a6d1d3eeb76e484499a00765eb
This is quite difficult to work around via a plugin. Theoretically, it's possible to override the Banner
item class from a plugin and validate the data before it reaches deserializeCompoundTag()
.
If you have any questions or comments about this advisory: * Email us at security@pmmp.io
{ "nvd_published_at": null, "cwe_ids": [], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-01-09T20:07:27Z" }