From 875dbe4bbd949b3a36cea22c86d7bd757c75cb71 Mon Sep 17 00:00:00 2001 From: Inkfish Date: Tue, 17 Aug 2010 02:09:47 +0000 Subject: Fixed an exploit where unauthorized GMs can give zeny through auction. git-svn-id: https://rathena.svn.sourceforge.net/svnroot/rathena/trunk@14379 54d463be-8e91-2dee-dedb-b68131a5f0ec --- src/map/clif.c | 6 ++++++ 1 file changed, 6 insertions(+) (limited to 'src/map/clif.c') diff --git a/src/map/clif.c b/src/map/clif.c index fd2f61522..3f4b314df 100644 --- a/src/map/clif.c +++ b/src/map/clif.c @@ -12795,6 +12795,12 @@ void clif_parse_Auction_bid(int fd, struct map_session_data *sd) unsigned int auction_id = RFIFOL(fd,2); int bid = RFIFOL(fd,6); + if( !pc_can_give_items(pc_isGM(sd)) ) + { //They aren't supposed to give zeny [Inkfish] + clif_displaymessage(sd->fd, msg_txt(246)); + return; + } + if( bid <= 0 ) clif_Auction_message(fd, 0); // You have failed to bid into the auction else if( bid > sd->status.zeny ) -- cgit v1.2.3-60-g2f50