Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 553304 (CVE-2015-5069) - <games-strategy/wesnoth-1.12.4: authentication information disclosure (CVE-2015-{5069,5070})
Summary: <games-strategy/wesnoth-1.12.4: authentication information disclosure (CVE-20...
Status: RESOLVED FIXED
Alias: CVE-2015-5069
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: B4 [noglsa/cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2015-06-26 09:28 UTC by Agostino Sarubbo
Modified: 2015-12-21 16:12 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-06-26 09:28:40 UTC
From ${URL} :

We've found and fixed a bug in our software, "The Battle for Wesnoth", which 
allowed malicious users to obtain the contents of client-side files containing 
passphrases used for content server authentication.

We would like to have a CVE id assigned to this issue if possible.


Description:

Wesnoth implements a text preprocessing language that is used in conjunction 
with its own game scripting language. It also has a built-in Lua interpreter 
and API. Both the Lua API and the preprocessor make use of the same function 
(filesystem::get_wml_location()) to resolve file paths so that only content 
from the user's data directory can be read.

However, the function did not explicitly disallow files with the .pbl 
extension. The contents of these files could thus be stored in saved game 
files or even transmitted directly to other users in a networked game. Among 
the information that's compromised is a user-defined passphrase used to 
authenticate uploads to the game's content server.

This issue was found by Toom L�hmus, then verified and fixed by Ignacio R. 
Morelle.


Bug report:

 * https://gna.org/bugs/?23504 - currently private to project members as it 
   includes a sufficiently elaborate exploit proof of concept.


Affected versions:

 * All existing versions up to and including 1.12.2 and 1.13.0.
 * 1.12.3 (tagged but not officially announced) contains a partial fix that
   only prevents inclusion of files with a lowercase extension.


Patches:

 * Original fix for lowercase extensions only: 
   https://github.com/wesnoth/wesnoth/commit/f8914468182e8d0a1551b430c0879ba236fe4d6d
 * More general, correct fix: 
   https://github.com/wesnoth/wesnoth/commit/b2738ffb2fdd2550ececb74f76f75583c43c8b59



@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 Yury German Gentoo Infrastructure gentoo-dev 2015-11-22 14:09:34 UTC
It has been some time since this Bug received an update. Since it is security related, bringing it up to the surface so it is not forgotten.

Any updates?
Comment 2 Mr. Bones. (RETIRED) gentoo-dev 2015-11-22 14:24:20 UTC
Affected versions are no longer in the tree so go ahead and do your thing.
Comment 3 Yury German Gentoo Infrastructure gentoo-dev 2015-11-22 14:40:17 UTC
Maintainer(s), Thank you 

Security Please Vote.
GLSA Vote: No
Comment 4 Yury German Gentoo Infrastructure gentoo-dev 2015-12-21 16:12:58 UTC
Arches and Maintainer(s), Thank you for your work.

Thank you all. Closing as noglsa.