The Python AI module in Wesnoth 1.4.x and 1.5 before 1.5.11 allows remote attackers to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the whitelisted module.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wesnoth | Wesnoth | 1.4 (including) | 1.4 (including) |
Wesnoth | Wesnoth | 1.4.1 (including) | 1.4.1 (including) |
Wesnoth | Wesnoth | 1.4.2 (including) | 1.4.2 (including) |
Wesnoth | Wesnoth | 1.4.3 (including) | 1.4.3 (including) |
Wesnoth | Wesnoth | 1.4.4 (including) | 1.4.4 (including) |
Wesnoth | Wesnoth | 1.4.5 (including) | 1.4.5 (including) |
Wesnoth | Wesnoth | 1.4.6 (including) | 1.4.6 (including) |
Wesnoth | Wesnoth | 1.4.7 (including) | 1.4.7 (including) |
Wesnoth | Wesnoth | 1.5.0 (including) | 1.5.0 (including) |
Wesnoth | Wesnoth | 1.5.1 (including) | 1.5.1 (including) |
Wesnoth | Wesnoth | 1.5.2 (including) | 1.5.2 (including) |
Wesnoth | Wesnoth | 1.5.3 (including) | 1.5.3 (including) |
Wesnoth | Wesnoth | 1.5.4 (including) | 1.5.4 (including) |
Wesnoth | Wesnoth | 1.5.5 (including) | 1.5.5 (including) |
Wesnoth | Wesnoth | 1.5.6 (including) | 1.5.6 (including) |
Wesnoth | Wesnoth | 1.5.7 (including) | 1.5.7 (including) |
Wesnoth | Wesnoth | 1.5.8 (including) | 1.5.8 (including) |
Wesnoth | Wesnoth | 1.5.9 (including) | 1.5.9 (including) |
Wesnoth | Wesnoth | 1.5.10 (including) | 1.5.10 (including) |
Wesnoth | Ubuntu | gutsy | * |
Wesnoth | Ubuntu | hardy | * |
Wesnoth | Ubuntu | intrepid | * |
Wesnoth | Ubuntu | upstream | * |