The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.3 and 1.13.x before 1.13.1 allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://github.com/wesnoth/wesnoth/releases/tag/1.13.1 | third party advisory release notes |
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161752.html | third party advisory vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1236010 | issue tracking vdb entry third party advisory |
https://github.com/wesnoth/wesnoth/commit/f8914468182e8d0a1551b430c0879ba236fe4d6d | third party advisory patch |
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161722.html | third party advisory vendor advisory |
https://gna.org/bugs/?23504 | broken link |
http://www.securityfocus.com/bid/75424 | vdb entry third party advisory |
http://www.openwall.com/lists/oss-security/2015/06/25/12 | mailing list patch vdb entry third party advisory |
https://github.com/wesnoth/wesnoth/releases/tag/1.12.3 | third party advisory release notes |