From 6586ac4ee9be6c96d08d243b203c4480fe0239d4 Mon Sep 17 00:00:00 2001 From: JaTiTV Date: Tue, 19 Jul 2022 18:27:07 +0200 Subject: [PATCH] 1.1.1 This update fixes a security vulnerability where players with modified clients could intercept all commands. This bug affects the proxy (Bungee, Waterfall etc.)! --- pom.xml | 2 +- src/main/java/net/t2code/alias/Bungee/system/BListener.java | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/pom.xml b/pom.xml index c658675..9735151 100644 --- a/pom.xml +++ b/pom.xml @@ -6,7 +6,7 @@ net.t2code Alias - 1.1.0 + 1.1.1 jar T2C-Alias diff --git a/src/main/java/net/t2code/alias/Bungee/system/BListener.java b/src/main/java/net/t2code/alias/Bungee/system/BListener.java index f1dec39..5168b07 100644 --- a/src/main/java/net/t2code/alias/Bungee/system/BListener.java +++ b/src/main/java/net/t2code/alias/Bungee/system/BListener.java @@ -15,7 +15,7 @@ public class BListener implements Listener { @EventHandler public void onPluginmessage(PluginMessageEvent event) { if (event.getTag().equalsIgnoreCase("t2codealias:bungee")) { - + event.setCancelled(true); DataInputStream stream = new DataInputStream(new ByteArrayInputStream(event.getData())); try { String channel = stream.readUTF();