Neither technical details nor an exploit are publicly available. No form of authentication is needed for exploitation. It is possible to initiate the attack remotely. This vulnerability is uniquely identified as CVE-2010-2445 since. The summary by CVE is:įreeciv 2.2 before 2.2.1 and 2.3 before 2.3.0 allows attackers to read arbitrary files or execute arbitrary commands via a scenario that contains Lua functionality, related to the (1) os, (2) io, (3) package, (4) dofile, (5) loadfile, (6) loadlib, (7) module, and (8) require modules or functions. This is going to have an impact on confidentiality, integrity, and availability. The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
![freeciv 2.2.0 freeciv 2.2.0](https://filesbear.com/windows/pics/24640/thumb/mahjong-waves-2.jpg)
The manipulation with an unknown input leads to a privilege escalation vulnerability. A high score indicates an elevated risk to be targeted for this vulnerability.Ī vulnerability, which was classified as very critical, was found in freeciv 2.2.0/2.3.0. The CTI Interest Score identifies the interest of attackers and the security community for this specific vulnerability in real-time. Our Cyber Threat Intelligence team is monitoring different web sites, mailing lists, exploit markets and social media networks.