Hackers exploit BleedingPipe RCE to target Minecraft servers, players

Teilen:

Hackers are actively exploiting a ‘BleedingPipe’ remote code execution vulnerability in Minecraft mods to run malicious commands on servers and clients, allowing them to take control of the devices.

BleedingPipe is a vulnerability found in many Minecraft mods caused by the incorrect use of deserialization in the ‘ObjectInputStream’ class in Java to exchange network packets between servers and clients.

In short, the attackers send specially crafted network packets to vulnerable Minecraft mod servers to take over the servers.

The threat actors can then use those hacked servers to exploit the flaws in the same Minecraft mods used by players that connect to the server, allowing them to install malware on those devices as well.

In a new report by a Minecraft security community (MMPA), the researchers have found that the flaw impacts many Minecraft mods running on 1.7.10/1.12.2 Forge, which uses unsafe deserialization code.

Actively exploited in July

The first signs of BleedingPipe exploitation appeared in the wild in March 2022 but were quickly fixed by mod developers.

However, earlier this month, a Forge forum post warned about large-scale active exploitation using an unknown zero-day RCE to steal players’ Discord and Steam session cookies.

“On July 9, 2023, a Forge forum post was made about a RCE happening live on a server, managing to compromise the server and send the discord credentials of clients, indicating the spread to clients,” explained MMPA’s article.

“The issue was nailed down to 3 mods; EnderCore, BDLib, and LogisticsPipes. However, this post did not go mainstream, and most were not aware.”

After further research, the MMPA has found that the BleedingPipe vulnerability is also present in the following Minecraft mods:

  • EnderCore
  • LogisticsPipes versions older than 0.10.0.71
  • BDLib 1.7 through 1.12
  • Smart Moving 1.12
  • Brazier
  • DankNull
  • Gadomancy
  • Advent of Ascension (Nevermine) version 1.12.2
  • Astral Sorcery versions 1.9.1 and older
  • EnderCore versions below 1.12.2-0.5.77
  • JourneyMap versions below 1.16.5-5.7.2
  • Minecraft Comes Alive (MCA) versions 1.5.2 through 1.6.4
  • RebornCore versions below 4.7.3
  • Thaumic Tinkerer versions below 2.3-138

However, it is essential to note that the above list isn’t complete, and BleedingPipe potentially impacts many more mods.

MMPA says a threat actor is actively scanning for Minecraft servers on the internet that are impacted by this flaw to conduct attacks, so fixing any vulnerable mods installed on servers is essential.

To protect your services and devices from BleedingPipe, download the latest release of impacted mods from the official release channels.

If the mod you’re using has not addressed the vulnerability via a security update, you should migrate to a fork that has adopted the fixes.

The MMPA team has also released a ‘PipeBlocker‘ mod to protect both forge servers and clients by filtering ‘ObjectInputSteam’ network traffic.

As the payload dropped by the attackers onto compromised systems is not yet known, server administrators are recommended to check all mods for suspicious file additions using the ‘jSus‘ or ‘jNeedle‘ scanners.

Players using mods known to be vulnerable are advised to perform similar scans on their .minecraft directory or the default directory used by their mod launcher to check for unusual files or malware.

Desktop users are also advised to run an antivirus scan to check for malicious executables installed on the system.

 

(c) Lawrence Abrams

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
10:46 pm, Juli 5, 2025
Wetter-Symbol 20°C
L: 18° | H: 21°
broken clouds
Luftfeuchtigkeit: 78 %
Druck: 1011 mb
Wind: 10 mph WSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 75%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:50 am
Sonnenuntergang: 9:19 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Tomorrow 10:00 pm
Wetter-Symbol
18° | 21°°C 1 mm 100% 11 mph 85 % 1010 mb 0 mm/h
Mo. Juli 07 10:00 pm
Wetter-Symbol
13° | 20°°C 1 mm 100% 13 mph 92 % 1015 mb 0 mm/h
Di. Juli 08 10:00 pm
Wetter-Symbol
13° | 24°°C 0 mm 0% 11 mph 78 % 1020 mb 0 mm/h
Mi. Juli 09 10:00 pm
Wetter-Symbol
15° | 26°°C 0 mm 0% 7 mph 67 % 1022 mb 0 mm/h
Do. Juli 10 10:00 pm
Wetter-Symbol
18° | 30°°C 0 mm 0% 5 mph 55 % 1023 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
19° | 19°°C 0 mm 0% 8 mph 79 % 1010 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 6 mph 85 % 1009 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
20° | 20°°C 0 mm 0% 7 mph 80 % 1006 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
19° | 19°°C 1 mm 100% 7 mph 85 % 1005 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
19° | 19°°C 1 mm 100% 9 mph 79 % 1005 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
19° | 19°°C 1 mm 100% 10 mph 77 % 1005 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
21° | 21°°C 1 mm 100% 11 mph 53 % 1005 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
18° | 18°°C 0.44 mm 44% 9 mph 60 % 1007 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,792.17
0.24%
Ethereum(ETH)
€2,136.64
0.99%
Fesseln(USDT)
€0.85
0.01%
XRP(XRP)
€1.88
-0.17%
Solana(SOL)
€125.12
0.42%
USDC(USDC)
€0.85
0.00%
Dogecoin(DOGE)
€0.139441
1.16%
Shiba Inu(SHIB)
€0.000009
0.85%
Pepe(PEPE)
€0.000008
1.07%
Nach oben scrollen