Lucene search

K
cvelistGitHub_MCVELIST:CVE-2023-30859
HistoryMay 01, 2023 - 1:41 p.m.

CVE-2023-30859 Spigot Command Exploit in Triton

2023-05-0113:41:19
CWE-419
GitHub_M
www.cve.org
command exploit
triton plugin
custompayload packet
bungee mode
server security
payload packet
admin phishing
geoip command
server language
config security
version 3.8.4 fix

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.3%

Triton is a Minecraft plugin for Spigot and BungeeCord that helps you translate your Minecraft server. The CustomPayload packet allows you to execute commands on the spigot/bukkit console. When you enable bungee mode in the config it will enable the bungee bridge and the server will begin to broadcast the ‘triton:main’ plugin channel. Using this plugin channel you are able to send a payload packet containing a byte (2) and a string (any spigot command). This could be used to make yourself a server operator and be used to extract other user information through phishing (pretending to be an admin), many servers use essentials so the /geoip command could be available to them, etc. This could also be modified to allow you to set the servers language, set another players language, etc. This issue affects those who have bungee enabled in config. This issue has been fixed in version 3.8.4.

CNA Affected

[
  {
    "vendor": "tritonmc",
    "product": "Triton",
    "versions": [
      {
        "version": "< 3.8.4",
        "status": "affected"
      }
    ]
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.3%

Related for CVELIST:CVE-2023-30859