Kawe Mazidjatari 619bbd161c Fix stringcmd replay exploit
This commit fixes an engine bug where netmessages are getting copied into the replay buffer, while these messages should never be replayed. The engine performs an internal check on 'CNetMessage::m_nGroup', and if its NOT 2, the message is getting copied into the replay buffer. All messages returning false in 'ShouldReplayMessage' are not getting copied into the replay buffer anymore. This exploit has been used in the past to route clients that were watching a replay to an arbitrary server, which essentially forms an info leak as the client attempts to connect to the arbitrary server on its own. The exploit also allows for some form of remote code execution, depending on if the client was launched in developer mode or not.
2023-05-30 23:01:46 +02:00
..
2023-05-29 21:41:17 +02:00
2023-05-10 00:05:38 +02:00
2023-05-10 00:05:38 +02:00
2023-05-10 00:05:38 +02:00
2023-05-10 00:05:38 +02:00
2023-03-20 00:17:29 +01:00
2023-05-29 21:41:17 +02:00
2023-05-10 00:05:38 +02:00
2023-05-15 18:00:51 +02:00
2023-05-30 23:01:46 +02:00
2023-05-30 23:01:46 +02:00
2023-01-26 02:59:50 +01:00
2023-03-20 00:17:29 +01:00
2022-04-10 19:59:34 +02:00