Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. pocketmine/pocketmine-mp
  4. ›
  5. GHSA-g274-c6jj-h78p

GHSA-g274-c6jj-h78p: PocketMine-MP allows malicious client data to waste server resources due to lack of limits for explode()

March 10, 2025

Due to lack of limits by default in the explode() function, malicious clients were able to abuse some packets to waste server CPU and memory.

This is similar to a previous security issue published in https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-gj94-v4p9-w672, but with a wider impact, including but not limited to:

  • Sign editing
  • LoginPacket JWT parsing
  • Command parsing

However, the estimated impact of these issues is low, due to other limits such as the packet decompression limit.

References

  • github.com/advisories/GHSA-g274-c6jj-h78p
  • github.com/pmmp/PocketMine-MP
  • github.com/pmmp/PocketMine-MP/commit/d0d84d4c5195fb0a68ea7725424fda63b85cd831
  • github.com/pmmp/PocketMine-MP/security/advisories/GHSA-g274-c6jj-h78p
  • github.com/pmmp/PocketMine-MP/security/advisories/GHSA-gj94-v4p9-w672

Code Behaviors & Features

Detect and mitigate GHSA-g274-c6jj-h78p with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 5.25.2

Fixed versions

  • 5.25.2

Solution

Upgrade to version 5.25.2 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-770: Allocation of Resources Without Limits or Throttling

Source file

packagist/pocketmine/pocketmine-mp/GHSA-g274-c6jj-h78p.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:22 +0000.