First published: Sat Dec 01 2007(Updated: )
Directory traversal vulnerability in the WML engine preprocessor for Wesnoth 1.2.x before 1.2.8, and 1.3.x before 1.3.12, allows remote attackers to read arbitrary files via ".." sequences in unknown vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
The Battle for Wesnoth | =0.8.7 | |
The Battle for Wesnoth | =1.1.11 | |
The Battle for Wesnoth | =0.4 | |
The Battle for Wesnoth | =0.8.9 | |
The Battle for Wesnoth | =0.7.7 | |
The Battle for Wesnoth | =0.5 | |
The Battle for Wesnoth | =0.3.2 | |
The Battle for Wesnoth | =0.8.4 | |
The Battle for Wesnoth | =0.8.2 | |
The Battle for Wesnoth | =0.9.3 | |
The Battle for Wesnoth | =0.7.9 | |
The Battle for Wesnoth | =0.4.1 | |
The Battle for Wesnoth | =0.9.2 | |
The Battle for Wesnoth | =0.9.0 | |
The Battle for Wesnoth | =0.8.6 | |
The Battle for Wesnoth | =1.0rcl | |
The Battle for Wesnoth | =0.9.5 | |
The Battle for Wesnoth | =0.6.99.5 | |
The Battle for Wesnoth | =1.1.8 | |
The Battle for Wesnoth | =0.7.4 | |
The Battle for Wesnoth | =1.2.4 | |
The Battle for Wesnoth | =0.4.2 | |
The Battle for Wesnoth | =0.6.99.2 | |
The Battle for Wesnoth | =0.3.3 | |
The Battle for Wesnoth | =1.1 | |
The Battle for Wesnoth | =1.2.2 | |
The Battle for Wesnoth | =0.3.4 | |
The Battle for Wesnoth | =1.1.3 | |
The Battle for Wesnoth | =1.2.7 | |
The Battle for Wesnoth | =0.4.4 | |
The Battle for Wesnoth | =0.7.5 | |
The Battle for Wesnoth | =0.8 | |
The Battle for Wesnoth | =1.1.14 | |
The Battle for Wesnoth | =0.2.1 | |
The Battle for Wesnoth | =1.2.1 | |
The Battle for Wesnoth | =0.8.11 | |
The Battle for Wesnoth | =0.7.11 | |
The Battle for Wesnoth | =0.4.8 | |
The Battle for Wesnoth | =0.7 | |
The Battle for Wesnoth | =0.8.8 | |
The Battle for Wesnoth | =0.7.2 | |
The Battle for Wesnoth | =0.4.6 | |
The Battle for Wesnoth | =1.1.6 | |
The Battle for Wesnoth | =0.9.6 | |
The Battle for Wesnoth | =0.8.1 | |
The Battle for Wesnoth | =1.2.5 | |
The Battle for Wesnoth | =0.6.99.3 | |
The Battle for Wesnoth | =0.5.1 | |
The Battle for Wesnoth | =1.1.1 | |
The Battle for Wesnoth | =1.2.8 | |
The Battle for Wesnoth | =0.7.1 | |
The Battle for Wesnoth | =0.4.3 | |
The Battle for Wesnoth | =0.7.8 | |
The Battle for Wesnoth | =0.3.1 | |
The Battle for Wesnoth | =0.4.5 | |
The Battle for Wesnoth | =1.1.10 | |
The Battle for Wesnoth | =1.1.5 | |
The Battle for Wesnoth | =0.8.5 | |
The Battle for Wesnoth | =0.7.6 | |
The Battle for Wesnoth | =0.7.3 | |
The Battle for Wesnoth | =0.9.7 | |
The Battle for Wesnoth | =1.2.3 | |
The Battle for Wesnoth | =1.1.4 | |
The Battle for Wesnoth | =0.8.3 | |
The Battle for Wesnoth | =1.2.6 | |
The Battle for Wesnoth | =1.1.9 | |
The Battle for Wesnoth | =0.9.1 | |
The Battle for Wesnoth | =0.8.10 | |
The Battle for Wesnoth | =1.1.12 | |
The Battle for Wesnoth | =0.6 | |
The Battle for Wesnoth | =1.1.7 | |
The Battle for Wesnoth | =0.6.1 | |
The Battle for Wesnoth | =0.6.99.4 | |
The Battle for Wesnoth | =1.1.2 | |
The Battle for Wesnoth | =0.6.99.1 | |
The Battle for Wesnoth | =1.1.13 | |
The Battle for Wesnoth | =1.2 | |
The Battle for Wesnoth | =0.4.7 | |
The Battle for Wesnoth | =0.9.4 | |
The Battle for Wesnoth | =0.3 | |
The Battle for Wesnoth | =0.7.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5742 is classified as a medium severity vulnerability due to its potential to allow unauthorized access to sensitive files.
To fix CVE-2007-5742, you should upgrade to Wesnoth version 1.2.8 or later, or 1.3.12 or later.
CVE-2007-5742 is a directory traversal vulnerability, which allows attackers to read arbitrary files on the server.
CVE-2007-5742 affects Wesnoth versions prior to 1.2.8 and 1.3.12, including several earlier versions.
An attacker exploiting CVE-2007-5742 could potentially access sensitive files on the server, leading to data breaches.