The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content.
References
Link | Resource |
---|---|
https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380 | Patch Third Party Advisory |
https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380 - Patch, Third Party Advisory |
Information
Published : 2018-07-23 16:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-1999023
Mitre link : CVE-2018-1999023
CVE.ORG link : CVE-2018-1999023
JSON object : View
Products Affected
wesnoth
- the_battle_for_wesnoth
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')