ToString bug

Revision as of 18:33, 18 March 2024 by Fune (talk | contribs) (Created page with "The toString bug is a BonziWORLD exploit discovered by Erik and popularised after being shared on Warsaw. It works by setting the contents of a message to an object, and then replacing the default "toString" function within this object, with a string, which causes an error when the server tries to auto-run it. This exploit was added to BluePanel (Fune's version) after it was patched on BWR. It has not been patched in most shitty low effort BonziWORLD serv...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

The toString bug is a BonziWORLD exploit discovered by Erik and popularised after being shared on Warsaw. It works by setting the contents of a message to an object, and then replacing the default "toString" function within this object, with a string, which causes an error when the server tries to auto-run it. This exploit was added to BluePanel (Fune's version) after it was patched on BWR. It has not been patched in most shitty low effort BonziWORLD servers, but has been patched on every big server. Since the bug is wide-spread it's ok to document it.

Code

This snippet of code is OP against shitty replit/render servers: socket.emit("talk", {text: {toString: ""}})