The version used of Log4j, the library used for logging by PowerNukkit, is subject to a remote code execution vulnerability via the ldap JNDI parser. It's well detailed at CVE-2021-44228 and CVE-2021-45105(https://github.com/advisories/GHSA-p6xc-xr62-6r2g).
Malicious client code could be used to send messages and cause remote code execution on the server.
PowerNukkit 1.5.2.1
is a patch-release that only updates the Log4j version to 2.17.0
and should be used instead of 1.5.2.0
.
All versions prior to 1.5.2.1
are affected and are not patched.
If you can't upgrade, you can use the -Dlog4j2.formatMsgNoLookups=true
startup argument as remediation, as this prevents the vulnerability from happening.
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q https://github.com/advisories/GHSA-p6xc-xr62-6r2g
If you have any questions or comments about this advisory: * Open an issue in the PowerNukkit repository
{ "nvd_published_at": null, "cwe_ids": [ "CWE-20", "CWE-400", "CWE-502" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2022-01-04T22:06:05Z" }