Vulnerabilites related to wesnoth - the_battle_for_wesnoth
Vulnerability from fkie_nvd
Published
2018-07-23 16:29
Modified
2024-11-21 03:57
Severity ?
Summary
The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380 | Patch, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
wesnoth | the_battle_for_wesnoth | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wesnoth:the_battle_for_wesnoth:*:*:*:*:*:*:*:*", "matchCriteriaId": "459CA902-67B6-4905-9626-DB7460C66191", "versionEndIncluding": "1.14.3", "versionStartIncluding": "1.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content." }, { "lang": "es", "value": "The Battle for Wesnoth Project desde la versi\u00f3n 1.7.0 hasta la 1.14.3 contiene una vulnerabilidad de inyecci\u00f3n de c\u00f3digo en el motor de scripting de Lua que puede resultar en la ejecuci\u00f3n de c\u00f3digo fuera del sandbox. El ataque parece ser explotable al cargar juegos, juegos en red, repeticiones y contenido del jugador especialmente manipulados." } ], "id": "CVE-2018-1999023", "lastModified": "2024-11-21T03:57:04.550", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-23T16:29:00.273", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2018-1999023 (GCVE-0-2018-1999023)
Vulnerability from cvelistv5
Published
2018-07-23 16:00
Modified
2024-09-17 03:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content.
References
▼ | URL | Tags |
---|---|---|
https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:47:57.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2018-07-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-23T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2018-07-22T01:05:34.780576", "DATE_REQUESTED": "2018-07-21T05:38:45", "ID": "CVE-2018-1999023", "REQUESTER": "shadowm2006@gmail.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380", "refsource": "CONFIRM", "url": "https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-1999023", "datePublished": "2018-07-23T16:00:00Z", "dateReserved": "2018-07-23T00:00:00Z", "dateUpdated": "2024-09-17T03:18:33.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }