Hackers exploit BleedingPipe RCE to target Minecraft servers, players

Teilen:

Hackers are actively exploiting a ‘BleedingPipe’ remote code execution vulnerability in Minecraft mods to run malicious commands on servers and clients, allowing them to take control of the devices.

BleedingPipe is a vulnerability found in many Minecraft mods caused by the incorrect use of deserialization in the ‘ObjectInputStream’ class in Java to exchange network packets between servers and clients.

In short, the attackers send specially crafted network packets to vulnerable Minecraft mod servers to take over the servers.

The threat actors can then use those hacked servers to exploit the flaws in the same Minecraft mods used by players that connect to the server, allowing them to install malware on those devices as well.

In a new report by a Minecraft security community (MMPA), the researchers have found that the flaw impacts many Minecraft mods running on 1.7.10/1.12.2 Forge, which uses unsafe deserialization code.

Actively exploited in July

The first signs of BleedingPipe exploitation appeared in the wild in March 2022 but were quickly fixed by mod developers.

However, earlier this month, a Forge forum post warned about large-scale active exploitation using an unknown zero-day RCE to steal players’ Discord and Steam session cookies.

“On July 9, 2023, a Forge forum post was made about a RCE happening live on a server, managing to compromise the server and send the discord credentials of clients, indicating the spread to clients,” explained MMPA’s article.

“The issue was nailed down to 3 mods; EnderCore, BDLib, and LogisticsPipes. However, this post did not go mainstream, and most were not aware.”

After further research, the MMPA has found that the BleedingPipe vulnerability is also present in the following Minecraft mods:

  • EnderCore
  • LogisticsPipes versions older than 0.10.0.71
  • BDLib 1.7 through 1.12
  • Smart Moving 1.12
  • Brazier
  • DankNull
  • Gadomancy
  • Advent of Ascension (Nevermine) version 1.12.2
  • Astral Sorcery versions 1.9.1 and older
  • EnderCore versions below 1.12.2-0.5.77
  • JourneyMap versions below 1.16.5-5.7.2
  • Minecraft Comes Alive (MCA) versions 1.5.2 through 1.6.4
  • RebornCore versions below 4.7.3
  • Thaumic Tinkerer versions below 2.3-138

However, it is essential to note that the above list isn’t complete, and BleedingPipe potentially impacts many more mods.

MMPA says a threat actor is actively scanning for Minecraft servers on the internet that are impacted by this flaw to conduct attacks, so fixing any vulnerable mods installed on servers is essential.

To protect your services and devices from BleedingPipe, download the latest release of impacted mods from the official release channels.

If the mod you’re using has not addressed the vulnerability via a security update, you should migrate to a fork that has adopted the fixes.

The MMPA team has also released a ‘PipeBlocker‘ mod to protect both forge servers and clients by filtering ‘ObjectInputSteam’ network traffic.

As the payload dropped by the attackers onto compromised systems is not yet known, server administrators are recommended to check all mods for suspicious file additions using the ‘jSus‘ or ‘jNeedle‘ scanners.

Players using mods known to be vulnerable are advised to perform similar scans on their .minecraft directory or the default directory used by their mod launcher to check for unusual files or malware.

Desktop users are also advised to run an antivirus scan to check for malicious executables installed on the system.

 

(c) Lawrence Abrams

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
12:29 pm, Juni 1, 2025
Wetter-Symbol 19°C
L: 18° | H: 20°
broken clouds
Luftfeuchtigkeit: 49 %
Druck: 1013 mb
Wind: 12 mph W
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 75%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:49 am
Sonnenuntergang: 9:07 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
18° | 20°°C 0 mm 0% 14 mph 70 % 1014 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
11° | 21°°C 0 mm 0% 10 mph 82 % 1019 mb 0 mm/h
Di. Juni 03 10:00 pm
Wetter-Symbol
11° | 17°°C 1 mm 100% 16 mph 92 % 1013 mb 0 mm/h
Mi. Juni 04 10:00 pm
Wetter-Symbol
9° | 19°°C 0 mm 0% 13 mph 83 % 1010 mb 0 mm/h
Do. Juni 05 10:00 pm
Wetter-Symbol
11° | 15°°C 1 mm 100% 13 mph 97 % 1009 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
18° | 19°°C 0 mm 0% 12 mph 49 % 1013 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
16° | 18°°C 0 mm 0% 14 mph 46 % 1013 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
15° | 17°°C 0 mm 0% 12 mph 51 % 1013 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
16° | 16°°C 0 mm 0% 9 mph 70 % 1014 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
13° | 13°°C 0 mm 0% 7 mph 82 % 1016 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 6 mph 78 % 1017 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
12° | 12°°C 0 mm 0% 9 mph 72 % 1018 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
16° | 16°°C 0 mm 0% 8 mph 48 % 1019 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,636.62
0.53%
Ethereum(ETH)
€2,198.91
-0.94%
Fesseln(USDT)
€0.88
0.01%
XRP(XRP)
€1.89
0.25%
Solana(SOL)
€133.71
-1.11%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.166129
0.97%
Shiba Inu(SHIB)
€0.000011
2.88%
Pepe(PEPE)
€0.000010
1.66%
Peanut das Eichhörnchen(PNUT)
€0.225486
2.88%
Nach oben scrollen