mirror of
https://github.com/DarkflameUniverse/DarkflameServer.git
synced 2026-05-22 15:24:57 +00:00
fix: security fixes (#1974)
* fix: security fixes dont print passwords for worlds bound strings from clients actually enable encryption between rakpeers dont allow underflow when reading a string Tested that packets are encrypted tested that models can still be built tested that combat still works * add check * use c++ nullptr instead of NULL * initialize to 0 * globalize constant (should be in a namespace at least in the future) * Update GameMessages.cpp * check bounds
This commit is contained in:
@@ -61,6 +61,7 @@ public:
|
||||
|
||||
uint32_t sBitStreamLength{};
|
||||
stream.Read(sBitStreamLength);
|
||||
if (sBitStreamLength > MAX_MESSAGE_LENGTH) return false;
|
||||
for (uint32_t k = 0; k < sBitStreamLength; k++) {
|
||||
unsigned char character;
|
||||
stream.Read(character);
|
||||
|
||||
@@ -100,6 +100,7 @@ public:
|
||||
|
||||
uint32_t sBitStreamLength{};
|
||||
stream.Read(sBitStreamLength);
|
||||
if (sBitStreamLength > MAX_MESSAGE_LENGTH) return false;
|
||||
for (uint32_t k = 0; k < sBitStreamLength; k++) {
|
||||
unsigned char character;
|
||||
stream.Read(character);
|
||||
|
||||
@@ -47,6 +47,7 @@ public:
|
||||
|
||||
uint32_t sBitStreamLength{};
|
||||
stream.Read(sBitStreamLength);
|
||||
if (sBitStreamLength > MAX_MESSAGE_LENGTH) return false;
|
||||
for (unsigned int k = 0; k < sBitStreamLength; k++) {
|
||||
unsigned char character;
|
||||
stream.Read(character);
|
||||
|
||||
@@ -2405,12 +2405,26 @@ void GameMessages::SendUnSmash(Entity* entity, LWOOBJID builderID, float duratio
|
||||
|
||||
void GameMessages::HandleControlBehaviors(RakNet::BitStream& inStream, Entity* entity, const SystemAddress& sysAddr) {
|
||||
AMFDeserialize reader;
|
||||
std::unique_ptr<AMFArrayValue> amfArguments{ static_cast<AMFArrayValue*>(reader.Read(inStream).release()) };
|
||||
std::unique_ptr<AMFArrayValue> amfArguments;
|
||||
try {
|
||||
auto deserializedData = reader.Read(inStream);
|
||||
if (!deserializedData || deserializedData->GetValueType() != eAmf::Array) {
|
||||
LOG("Failed to deserialize AMF data for control behaviors command: not an array");
|
||||
return;
|
||||
}
|
||||
|
||||
amfArguments.reset(static_cast<AMFArrayValue*>(deserializedData.release()));
|
||||
} catch (...) {
|
||||
LOG("Failed to deserialize AMF data for control behaviors command");
|
||||
return;
|
||||
}
|
||||
if (amfArguments->GetValueType() != eAmf::Array) return;
|
||||
|
||||
uint32_t commandLength{};
|
||||
inStream.Read(commandLength);
|
||||
|
||||
if (commandLength > MAX_MESSAGE_LENGTH) return; // Prevent DoS via unbounded command buffer
|
||||
|
||||
std::string command;
|
||||
command.reserve(commandLength);
|
||||
for (uint32_t i = 0; i < commandLength; ++i) {
|
||||
@@ -3616,6 +3630,8 @@ void GameMessages::HandlePetTamingTryBuild(RakNet::BitStream& inStream, Entity*
|
||||
|
||||
inStream.Read(brickCount);
|
||||
|
||||
if (brickCount > MAX_MESSAGE_LENGTH) return; // Prevent DoS via unbounded brick count
|
||||
|
||||
bricks.reserve(brickCount);
|
||||
|
||||
for (uint32_t i = 0; i < brickCount; i++) {
|
||||
@@ -5806,6 +5822,8 @@ void GameMessages::HandleReportBug(RakNet::BitStream& inStream, Entity* entity)
|
||||
uint32_t messageLength;
|
||||
inStream.Read(messageLength);
|
||||
|
||||
if (messageLength > MAX_MESSAGE_LENGTH) return;
|
||||
|
||||
for (uint32_t i = 0; i < (messageLength); ++i) {
|
||||
uint16_t character;
|
||||
inStream.Read(character);
|
||||
@@ -5817,6 +5835,7 @@ void GameMessages::HandleReportBug(RakNet::BitStream& inStream, Entity* entity)
|
||||
|
||||
uint32_t clientVersionLength;
|
||||
inStream.Read(clientVersionLength);
|
||||
if (clientVersionLength > MAX_MESSAGE_LENGTH) return;
|
||||
for (unsigned int k = 0; k < clientVersionLength; k++) {
|
||||
unsigned char character;
|
||||
inStream.Read(character);
|
||||
@@ -5825,6 +5844,7 @@ void GameMessages::HandleReportBug(RakNet::BitStream& inStream, Entity* entity)
|
||||
|
||||
uint32_t nOtherPlayerIDLength;
|
||||
inStream.Read(nOtherPlayerIDLength);
|
||||
if (nOtherPlayerIDLength > MAX_MESSAGE_LENGTH) return;
|
||||
for (unsigned int k = 0; k < nOtherPlayerIDLength; k++) {
|
||||
unsigned char character;
|
||||
inStream.Read(character);
|
||||
@@ -5833,6 +5853,7 @@ void GameMessages::HandleReportBug(RakNet::BitStream& inStream, Entity* entity)
|
||||
|
||||
uint32_t selectionLength;
|
||||
inStream.Read(selectionLength);
|
||||
if (selectionLength > MAX_MESSAGE_LENGTH) return;
|
||||
for (unsigned int k = 0; k < selectionLength; k++) {
|
||||
unsigned char character;
|
||||
inStream.Read(character);
|
||||
@@ -6135,14 +6156,17 @@ void GameMessages::HandleUpdateInventoryGroup(RakNet::BitStream& inStream, Entit
|
||||
|
||||
uint32_t size{};
|
||||
if (!inStream.Read(size)) return;
|
||||
if (size > MAX_MESSAGE_LENGTH) return; // Bounds check before resize
|
||||
action.resize(size);
|
||||
if (!inStream.Read(action.data(), size)) return;
|
||||
|
||||
if (!inStream.Read(size)) return;
|
||||
if (size > MAX_MESSAGE_LENGTH) return; // Bounds check before resize
|
||||
groupUpdate.groupId.resize(size);
|
||||
if (!inStream.Read(groupUpdate.groupId.data(), size)) return;
|
||||
|
||||
if (!inStream.Read(size)) return;
|
||||
if (size > MAX_MESSAGE_LENGTH / 2) return; // Bounds check: size * 2 would overflow or exceed limit
|
||||
groupName.resize(size);
|
||||
if (!inStream.Read(reinterpret_cast<char*>(groupName.data()), size * 2)) return;
|
||||
|
||||
|
||||
@@ -54,6 +54,7 @@ public:
|
||||
|
||||
uint32_t sBitStreamLength{};
|
||||
stream.Read(sBitStreamLength);
|
||||
if (sBitStreamLength > MAX_MESSAGE_LENGTH) return false;
|
||||
for (uint32_t k = 0; k < sBitStreamLength; k++) {
|
||||
unsigned char character;
|
||||
stream.Read(character);
|
||||
|
||||
@@ -111,6 +111,7 @@ public:
|
||||
|
||||
uint32_t sBitStreamLength{};
|
||||
stream.Read(sBitStreamLength);
|
||||
if (sBitStreamLength > MAX_MESSAGE_LENGTH) return false;
|
||||
for (uint32_t k = 0; k < sBitStreamLength; k++) {
|
||||
unsigned char character;
|
||||
stream.Read(character);
|
||||
|
||||
@@ -46,6 +46,7 @@ public:
|
||||
stream.Read(bDone);
|
||||
uint32_t sBitStreamLength{};
|
||||
stream.Read(sBitStreamLength);
|
||||
if (sBitStreamLength > MAX_MESSAGE_LENGTH) return false;
|
||||
for (uint32_t k = 0; k < sBitStreamLength; k++) {
|
||||
unsigned char character;
|
||||
stream.Read(character);
|
||||
|
||||
Reference in New Issue
Block a user