Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dangerous public servers LUA eval #101

Open
BiosNod opened this issue Oct 22, 2022 · 1 comment
Open

Dangerous public servers LUA eval #101

BiosNod opened this issue Oct 22, 2022 · 1 comment

Comments

@BiosNod
Copy link

BiosNod commented Oct 22, 2022

I read in discord in "Public servers" about dangerous LUA eval ability:

Only join servers from people you trust, malicous server owners can send a packet to execute lua code on your computer (RCE).
We are not responsible for anything that happens to your computer when you join public servers.

Servers can deliver new script payloads to the client, and the client will execute them in an environment that can launch other programs on the host machine. It's not GC-specific, so any protections in GC are useless, protections will need to be clientside to have any security.

@Hartie95 says: If I remember it correctly akebi also has protection for that build in

This is really not funny when the server can send the code to your computer and it will execute it, maybe probably add a client patch against the server code execution, some option to do that?

@KingRainbow44
Copy link
Member

this is one of the larger concerns surrounding private servers, and something the team has thought of many times. currently the focus is on getting UserAssembly patching into Cultivation since this can already be done when injecting akebi. it's definitely a feature that will be implemented at some point though!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants