
Cloud Vulnerability DB
A community-led vulnerabilities database
Dungeon Crawl Stone Soup (DCSS or crawl) before version 0.25 contained a remote code execution vulnerability (CVE-2020-11722) that allowed attackers to execute arbitrary code via Lua bytecode embedded in an uploaded .crawlrc configuration file (NVD, Security Blog).
The vulnerability existed due to insufficient restrictions on Lua function calls within user-supplied Lua scripts. The game's .crawlrc configuration files could include Lua 5.1 scripts, and the global environment for these scripts included the load and loadstring functions that could process both Lua scripts and bytecode. Although Lua 5.1 included a bytecode verifier, known weaknesses in that verifier could be exploited. The vulnerability received a CVSS v3.1 Base Score of 9.8 CRITICAL (NVD).
A successful exploit could allow remote attackers to achieve arbitrary code execution on affected systems. The vulnerability could be exploited on any public DCSS server regardless of operating system, though specific exploit modifications were needed for different architectures (Security Blog).
The vulnerability was fixed in DCSS version 0.25 through two commits that disabled Lua bytecode loading. The fixes included blocking bytecode chunks (which begin with byte 0x1b) and disabling the load() and loadstring() functions (GitHub Commit, GitHub Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."