Miggo Logo

GHSA-42qm-8v8m-m78c: PocketMine MP vulnerable to uncontrolled resource consumption via mismatched type of 'InventoryTransactionPacket'

5.3

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
6/1/2023
Updated
6/1/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
pocketmine/pocketmine-mpcomposer< 4.18.0-ALPHA24.18.0-ALPHA2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from immediate processing of 'MismatchTransactionData' inventory transactions without rate limiting. The advisory specifies the root cause was lack of deferral until tick end and missing rate limits. The fix introduced deferred syncing (tick-end buffering) and the workaround suggests plugin-level rate limiting. This implies the vulnerable code path directly handled mismatch transactions in the packet handler without these protections. While exact code isn't shown, the PacketHandler architecture pattern in PocketMine-MP and the described vulnerability mechanism strongly indicate the MismatchTransactionData handler function as the vulnerable point.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t * "mism*t**" typ* `Inv*ntoryTr*ns**tionP**k*t` is s*nt *y t** *li*nt to r*qu*st * r*syn* o* *ll *urr*ntly op*n inv*ntori*s. Sin** Po*k*tMin*-MP *o*s not r*t*-limit t**s* "mism*t**" tr*ns**tions, *n* t** syn*in* o* inv*ntori*s is not ****r

Reasoning

T** vuln*r**ility st*ms *rom imm**i*t* pro**ssin* o* 'Mism*t**Tr*ns**tion**t*' inv*ntory tr*ns**tions wit*out r*t* limitin*. T** **visory sp**i*i*s t** root **us* w*s l**k o* ****rr*l until ti*k *n* *n* missin* r*t* limits. T** *ix intro*u*** ****rr*