Topic: Possible bug allowing attacker to execute rcon commands
I don't know whether this is a bug in Teeworlds but it seems likely to me.
So this happend: someone could execute console commands under my id (0) and the id of another admin (2), allowing him to kick, etc:
[53ee486d][server]: ClientID=2 rcon='kick 2'
[53ee486d][server]: you can't kick yourself
[53ee486d][server]: ClientID=0 rcon='kick 2'
[53ee486d][server]: client dropped. cid=2 addr=#removed# reason='Kicked by console'
They also seemed kind of proud about it:
[53ee4656][server]: ClientID=0 rcon='broadcast Hacked by iX::Pikotee & solala.''
I know that DNS amplification attacks work in a way where UDP packages are sent with a manipulated sender ip so that the DNS responds to that ip.
So my question is: Could someone send manipulated packages to the server this way, leading to a behaviour like explained above? Let's assume the attacker knows the ip of the admin (I think you can get someone's ip through Skype).
The server was running zCatch and I assume that that kind of a bug wasn't introduced in this mod. Also I assume that it's not the client since this would require that we both were hacked. We use modded clients, but very diffent ones.
Edit: Of course incoming packages are checked against ip and port. But they might be able to test each port.