Callvote ET exploit - the truth

Hi,

in regard to the news: Callvote + q3fill Bugfix I would like to enlight the problem. The callvote exploit really exist and allow the attacker execute any server command. For example hacker can change rcon password or disable lua patches and crash server via ws exploit. But! Attacker has to use a hacked client and pass the vote. I don't have any informations that this bug works with ACpro 2.1, altough i made a quick fix ( more updates/features coming soon ).

Of course at the moment CB, ESL haven't already updated their configs with new combinedfixes.lua by Reyalp (am i right?). There is a problem with the newest fixed code - propably not working at all. So i made a corrected version. Here u go a link for lua modules: http://acpro.wolfteam.pl//category.php?id=1

If You are an admin of CB/ESL please follow this discussion: http://bani.anime.net/banimod/forums/viewtopic.php?p=66691#66691

regards
Comments
29
its not funny img kid
your english sucks
Parent
your IQ sucks
Parent
i guess u know what u said?
most pl ppl are a bit stupid but nvm ;) have a look @ Pbbans ;)

NN
Parent
Yes, there is a such group...Are u a member?
Give me the link to thread @ pbbans...
Parent
Says the smartass...
Parent
killer instinct best game ever ::D:D:DD:
Nice. Thanks.
to much to read
this bug is old and the most lowbobs didnt know... thx for publishment Luk4ward
really... i never meet which such abuse... so why i have to care?
very old bug :-/ and besides everyone is able to see what he is voting..
and he needs the vote to pass

(at least at rtcw 1.0)
hmm so why u didnt report this to someone?
Parent
btw now everyone knows the bug, gg a simple google will give them the modified exe ^^
Parent
NEW? gtfo :DD
gtfo nolifer 24/7/356
Parent
u fail.

its 365 u fuckin cockmongler!
Parent
its also traceble in the server logs...
Back to top