Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Server redirection exploit (AMXX example) #1480

Closed
shavitush opened this issue Feb 9, 2014 · 13 comments
Closed

Server redirection exploit (AMXX example) #1480

shavitush opened this issue Feb 9, 2014 · 13 comments

Comments

@shavitush
Copy link

Old server redirection was:
client_cmd( client, "connect XX.XX.XX.XX:XXXXX" );

New exploit:
client_cmd( client, ";^"Connect^" XX.XX.XX.XX:XXXXX" );

Won't it be better to do like the askconnect_accept command in Source Engine games and the server redirection box? Feels less hacky.

@Freeman-AM
Copy link

This dream will never be a reality, please guys stop reporting these usages, unless you dislike using xredirect.

@shavitush
Copy link
Author

It's not I dislike using xREDIRECT or w/e, I just don't want stupid servers to redirect me when I don't even want, I mean - I play on a random dust2 server, when admin connects if it's full - a reserved slot will be used, but some random player will be kicked to another server, that's stupid.

@Shevchik
Copy link

Totally agree. Redirects from servers should be forbidden.

@Freeman-AM
Copy link

It's depend how communities setup their xRedirect, it's not my case in my community.
And people are fully happy of it.
Server full is server full.
It's only an ingame switch usage with /server

@APGRoboCop
Copy link

This matter should really be reported to AlliedMods. But I got confirmation from there that xRedirect v2 RC2-beta is dead, even though I was kinda misled to think xRE is still open and downloadable, as I thought it was still going. But AMXX isn't AlliedMods top priority compared to SourceMod.

Also we shouldn't be really discussing AMXX problems in here, as you should be aware that Valve aren't truly affiliated with AlliedMods, if I am not mistaken.

@Shevchik
Copy link

Shevchik commented Mar 1, 2014

This commands should be blocked on client so this is definitely a valve issue.

@shavitush
Copy link
Author

@APGRoboCop I just gave an example of malicious usage of it using the AMX Mod X platform which is available in most GoldSRC dedicated servers.

@illiftwhat
Copy link

This command is not blocked and is bypass by all server... the server browser is just full of redirection server

client_cmd(id, "wait;wait;wait;wait;wait;^"connect^" %s",server);

This exploit is never fixed since 2014...

@di57inct
Copy link

@illiftwhat Oh, there are far worse things than that which still work. I can make a script which will infect your PC through any GoldSrc engine game on Steam. This is Valve we're talking about here. Lower your expectations.

@illiftwhat
Copy link

there are 25,000 players on counter-strike (steam stats), the game is still on sale in the steam store

And Valve made ​​the ostrich... They just want to make money with CSGO and skin

@blatouchm
Copy link

blatouchm commented Apr 27, 2019

Lol, just dont play on this shit servers and keep other good. Valve now disable connect command and redirect no longer working = bullshit. I have 100+ servers and steam players cant use /server command.

@SamVanheer
Copy link

So you're saying this issue has been fixed? If so this issue can be closed.

@oaus
Copy link

oaus commented Apr 28, 2019

So you're saying this issue has been fixed? If so this issue can be closed.

Yes it's fixed now.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests