Vulnerability Details : CVE-2015-5070
The (1) filesystem::get_wml_location function in filesystem.cpp and (2) is_legal_file function in filesystem_boost.cpp in Battle for Wesnoth before 1.12.4 and 1.13.x before 1.13.1, when a case-insensitive filesystem is used, allow remote attackers to obtain sensitive information via vectors related to inclusion of .pbl files from WML. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-5069.
Vulnerability category: Information leak
Products affected by CVE-2015-5070
- cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
- cpe:2.3:a:wesnoth:battle_for_wesnoth:*:*:*:*:*:*:*:*
- cpe:2.3:a:wesnoth:battle_for_wesnoth:1.13.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-5070
0.66%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 69 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-5070
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:P/I:N/A:N |
6.8
|
2.9
|
NIST | |
3.1
|
LOW | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N |
1.6
|
1.4
|
NIST |
CWE ids for CVE-2015-5070
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-5070
-
https://github.com/wesnoth/wesnoth/releases/tag/1.13.1
Release 1.13.1 · wesnoth/wesnoth · GitHubRelease Notes;Third Party Advisory
-
https://gna.org/bugs/?23504
Broken Link
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161752.html
[SECURITY] Fedora 22 Update: wesnoth-1.12.4-1.fc22Third Party Advisory
-
http://www.securityfocus.com/bid/75425
Wesnoth CVE-2015-5070 Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161722.html
[SECURITY] Fedora 21 Update: wesnoth-1.12.4-1.fc21Third Party Advisory
-
https://github.com/wesnoth/wesnoth/releases/tag/1.12.4
Release 1.12.4 · wesnoth/wesnoth · GitHubRelease Notes;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2015/06/25/12
oss-security - Re: CVE request: Wesnoth authentication information disclosureMailing List;Patch;Third Party Advisory;VDB Entry
-
https://bugzilla.redhat.com/show_bug.cgi?id=1236010
1236010 – (CVE-2015-5069, CVE-2015-5070) CVE-2015-5069 CVE-2015-5070 wesnoth: authentication information disclosureIssue Tracking;Patch;Third Party Advisory;VDB Entry
-
https://github.com/wesnoth/wesnoth/commit/b2738ffb2fdd2550ececb74f76f75583c43c8b59
Use looks_like_pbl() to disallow .pbl file inclusion (bug #23504) · wesnoth/wesnoth@b2738ff · GitHubPatch;Third Party Advisory
Jump to