Skip to content

1.21.0 - Prevent RCE exploit clientside

Compare
Choose a tag to compare
@moom0o moom0o released this 10 Dec 23:03
· 1501 commits to master since this release
  • Block all messages from reaching players if they contain ${ this should hopefully prevent any clients from running code from the recently found log4j remote code vulnerability. MAKE SURE TO USE Papaya FOR SERVER SIDE OR YOU COULD POSSIBLY BE BACKDOORED!
PreventRCEClientSideExploit: true # CLIENTSIDE ONLY - SERVER IS STILL VULNERABLE Blocks all messages containing "${" make sure you are using mojang's patch (https://www.minecraft.net/en-us/article/important-message--security-vulnerability-java-edition) or updated Papaya to patch this exploit on the server side, OTHERWISE YOU CAN BE BACKDOORED.
  • Add a reminder warning every minute to install ProtocolLib since it's essential. Specify in config.yml to disable protocollib completely to remove this message, but protocollib is required to patch many exploits.
  • Add a list of commands that will have the antispam activated for them. Useful if you don't want to have the antispam active on non chat commands. (#43)
AntiSpamCommandsUseWhitelist: false
AntiSpamCommandsWhitelist:
  - /msg
  - /message
  - /r
  - /reply
  - /w
  - /whisper
  - /tell
  • Add max skulls per chunk config option, useful if you have lots of skulls getting stuck in one chunk and lagging/freezing the server.
MaxSkullsPerChunk: 50