Skip to content

Instantly share code, notes, and snippets.

@makamys
Last active February 7, 2024 10:43
Show Gist options
  • Star 7 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save makamys/3cc10a6c552b6b3d52e09da256ac8f7b to your computer and use it in GitHub Desktop.
Save makamys/3cc10a6c552b6b3d52e09da256ac8f7b to your computer and use it in GitHub Desktop.
1.7.10 Security Vulnerabilities

1.7.10 Security Vulnerabilities

Having been released over 9 years ago, Minecraft 1.7.10 is no longer officially supported, which means it is up to the users to mitigate security vulnerabilities.

I cannot guarantee this list is complete or accurate, this is just a compilation of what I have learned.

Log4J CVE-2021-44228 ("Log4Shell")

Date discovered: 2021-12-10

Severity: Allows remote code execution.

Affected: Potentially anyone running a server or connecting to one, even in vanilla.

Details: https://nvd.nist.gov/vuln/detail/CVE-2021-44228

Mitigation:

BiblioRCE

Date discovered: 2022-10-27

Severity: Allows restricted remote file access, and by extension, remote code execution.

Affected: Servers running BiblioCraft.

Details: https://github.com/Exopteron/BiblioRCE

Mitigation:

Bleeding Pipe

Date discovered: 2023-07-29

Severity: Allows remote code execution on clients and servers (and therefore all connected clients on a server).

Affected: Servers running vulnerable mods and players connected to them.

Details: https://github.com/dogboy21/serializationisbad

Mitigation:

  • The following mods mitigate the issue:
    • SerializationIsBad (CurseForge | Modrinth | GitHub)
    • PipeBlocker (CurseForge | Modrinth | GitHub)
      • "only works on [1.7.10 and 1.12.2] and has some known limitations/issues which may not be addressed (it will not work on the old version of Java provided by the CurseForge & Mojang launchers, for example)." - embeddedt, 2023-08-03
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment