Vulnerability Description
The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wesnoth | The Battle For Wesnoth | >= 1.7.0, <= 1.14.3 |
Related Weaknesses (CWE)
References
- https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380PatchThird Party Advisory
- https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380PatchThird Party Advisory
FAQ
What is CVE-2018-1999023?
CVE-2018-1999023 is a vulnerability with a CVSS score of 8.8 (HIGH). The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appea...
How severe is CVE-2018-1999023?
CVE-2018-1999023 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1999023?
Check the references section above for vendor advisories and patch information. Affected products include: Wesnoth The Battle For Wesnoth.