The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.3 and 1.13.x before 1.13.1 allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML.
References
Configurations
History
21 Nov 2024, 02:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161722.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161752.html - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/06/25/12 - Mailing List, Patch, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/75424 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1236010 - Issue Tracking, Third Party Advisory, VDB Entry | |
References | () https://github.com/wesnoth/wesnoth/commit/f8914468182e8d0a1551b430c0879ba236fe4d6d - Patch, Third Party Advisory | |
References | () https://github.com/wesnoth/wesnoth/releases/tag/1.12.3 - Release Notes, Third Party Advisory | |
References | () https://github.com/wesnoth/wesnoth/releases/tag/1.13.1 - Release Notes, Third Party Advisory | |
References | () https://gna.org/bugs/?23504 - Broken Link |
Information
Published : 2017-09-26 14:29
Updated : 2024-11-21 02:32
NVD link : CVE-2015-5069
Mitre link : CVE-2015-5069
CVE.ORG link : CVE-2015-5069
JSON object : View
Products Affected
fedoraproject
- fedora
wesnoth
- battle_for_wesnoth
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor