{ "schema_version": "1.4.0", "id": "GHSA-hmxr-rwh4-hh58", "modified": "2022-05-02T03:14:58Z", "published": "2022-05-02T03:14:58Z", "aliases": [ "CVE-2009-0367" ], "details": "The Python AI module in Wesnoth 1.4.x and 1.5 before 1.5.11 allows remote attackers to escape the sandbox and execute arbitrary code by using a whitelisted module that imports an unsafe module, then using a hierarchical module name to access the unsafe module through the whitelisted module.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0367" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49058" }, { "type": "WEB", "url": "https://gna.org/bugs/index.php?13048" }, { "type": "WEB", "url": "http://launchpad.net/bugs/335089" }, { "type": "WEB", "url": "http://launchpad.net/bugs/336396" }, { "type": "WEB", "url": "http://launchpad.net/bugs/cve/2009-0367" }, { "type": "WEB", "url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.4.7-4/changelog" }, { "type": "WEB", "url": "http://packages.debian.org/changelogs/pool/main/w/wesnoth/wesnoth_1.5.12-1/changelog" }, { "type": "WEB", "url": "http://secunia.com/advisories/34058" }, { "type": "WEB", "url": "http://secunia.com/advisories/34236" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1737" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/0595" }, { "type": "WEB", "url": "http://www.wesnoth.org/forum/viewtopic.php?t=24247" }, { "type": "WEB", "url": "http://www.wesnoth.org/forum/viewtopic.php?t=24340" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2009-03-05T02:30:00Z" } }