The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.3 and 1.13.x before 1.13.1 allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML.
References
Link | Resource |
---|---|
https://gna.org/bugs/?23504 | Broken Link |
https://github.com/wesnoth/wesnoth/releases/tag/1.13.1 | Release Notes Third Party Advisory |
https://github.com/wesnoth/wesnoth/releases/tag/1.12.3 | Release Notes Third Party Advisory |
https://github.com/wesnoth/wesnoth/commit/f8914468182e8d0a1551b430c0879ba236fe4d6d | Patch Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1236010 | Issue Tracking Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/75424 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2015/06/25/12 | Mailing List Patch Third Party Advisory VDB Entry |
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161752.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161722.html | Third Party Advisory |
Information
Published : 2017-09-26 07:29
Updated : 2017-10-10 07:54
NVD link : CVE-2015-5069
Mitre link : CVE-2015-5069
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
wesnoth
- battle_for_wesnoth
fedoraproject
- fedora