Vulnerabilites related to smarty - smarty
cve-2008-1066
Vulnerability from cvelistv5
Published
2008-02-28 20:00
Modified
2024-08-07 08:08
Severity ?
EPSS score ?
Summary
The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:08:57.497Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "29398", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29398" }, { "name": "29241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29241" }, { "name": "DSA-1520", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1520" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652" }, { "name": "GLSA-201111-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201111-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.smarty.net/misc/NEWS" }, { "name": "29405", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29405" }, { "name": "FEDORA-2008-2656", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html" }, { "name": "29392", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29392" }, { "name": "29839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29839" }, { "name": "SUSE-SR:2008:007", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html" }, { "name": "smarty-modifierregexreplace-security-bypass(41002)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41002" }, { "name": "FEDORA-2008-2587", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html" }, { "name": "28105", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28105" }, { "name": "FEDORA-2008-2650", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html" }, { "name": "29562", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29562" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a \u0027\\0\u0027 character in a search string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "29398", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29398" }, { "name": "29241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29241" }, { "name": "DSA-1520", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1520" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652" }, { "name": "GLSA-201111-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201111-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.smarty.net/misc/NEWS" }, { "name": "29405", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29405" }, { "name": "FEDORA-2008-2656", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html" }, { "name": "29392", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29392" }, { "name": "29839", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29839" }, { "name": "SUSE-SR:2008:007", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html" }, { "name": "smarty-modifierregexreplace-security-bypass(41002)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41002" }, { "name": "FEDORA-2008-2587", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html" }, { "name": "28105", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28105" }, { "name": "FEDORA-2008-2650", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html" }, { "name": "29562", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29562" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1066", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a \u0027\\0\u0027 character in a search string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "29398", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29398" }, { "name": "29241", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29241" }, { "name": "DSA-1520", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1520" }, { "name": "http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652", "refsource": "CONFIRM", "url": "http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652" }, { "name": "GLSA-201111-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201111-04.xml" }, { "name": "http://www.smarty.net/misc/NEWS", "refsource": "CONFIRM", "url": "http://www.smarty.net/misc/NEWS" }, { "name": "29405", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29405" }, { "name": "FEDORA-2008-2656", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html" }, { "name": "29392", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29392" }, { "name": "29839", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29839" }, { "name": "SUSE-SR:2008:007", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html" }, { "name": "smarty-modifierregexreplace-security-bypass(41002)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41002" }, { "name": "FEDORA-2008-2587", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html" }, { "name": "28105", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28105" }, { "name": "FEDORA-2008-2650", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html" }, { "name": "http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html", "refsource": "CONFIRM", "url": "http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html" }, { "name": "29562", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29562" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1066", "datePublished": "2008-02-28T20:00:00", "dateReserved": "2008-02-28T00:00:00", "dateUpdated": "2024-08-07T08:08:57.497Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-7193
Vulnerability from cvelistv5
Published
2007-04-12 19:00
Modified
2024-08-07 20:57
Severity ?
EPSS score ?
Summary
PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter. NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=116163668213491&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://osvdb.org/31096 | vdb-entry, x_refsource_OSVDB | |
http://marc.info/?l=bugtraq&m=116170769322920&w=2 | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/29739 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:57:41.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20061023 Smarty-2.6.1 Remote File Include Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=116163668213491\u0026w=2" }, { "name": "31096", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/31096" }, { "name": "20061024 Re: Smarty-2.6.1 Remote File Include Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=116170769322920\u0026w=2" }, { "name": "smarty-test-file-include(29739)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29739" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter. NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20061023 Smarty-2.6.1 Remote File Include Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=116163668213491\u0026w=2" }, { "name": "31096", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/31096" }, { "name": "20061024 Re: Smarty-2.6.1 Remote File Include Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=116170769322920\u0026w=2" }, { "name": "smarty-test-file-include(29739)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29739" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-7193", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter. NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20061023 Smarty-2.6.1 Remote File Include Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=116163668213491\u0026w=2" }, { "name": "31096", "refsource": "OSVDB", "url": "http://osvdb.org/31096" }, { "name": "20061024 Re: Smarty-2.6.1 Remote File Include Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=116170769322920\u0026w=2" }, { "name": "smarty-test-file-include(29739)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29739" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-7193", "datePublished": "2007-04-12T19:00:00", "dateReserved": "2007-04-12T00:00:00", "dateUpdated": "2024-08-07T20:57:41.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-13982
Vulnerability from cvelistv5
Published
2018-09-18 21:00
Modified
2024-08-05 09:21
Severity ?
EPSS score ?
Summary
Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.
References
▼ | URL | Tags |
---|---|---|
https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50 | x_refsource_CONFIRM | |
https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8 | x_refsource_CONFIRM | |
https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1 | x_refsource_CONFIRM | |
https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe | x_refsource_CONFIRM | |
https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531 | x_refsource_CONFIRM | |
https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T09:21:40.766Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal" }, { "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "name": "[debian-lts-announce] 20211020 [SECURITY] [DLA 2618-3] smarty3 regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-09-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-20T13:06:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal" }, { "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "name": "[debian-lts-announce] 20211020 [SECURITY] [DLA 2618-3] smarty3 regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-13982", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50", "refsource": "CONFIRM", "url": "https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50" }, { "name": "https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8", "refsource": "CONFIRM", "url": "https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8" }, { "name": "https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1", "refsource": "CONFIRM", "url": "https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1" }, { "name": "https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe", "refsource": "CONFIRM", "url": "https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe" }, { "name": "https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531", "refsource": "CONFIRM", "url": "https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531" }, { "name": "https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal", "refsource": "MISC", "url": "https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal" }, { "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "name": "[debian-lts-announce] 20211020 [SECURITY] [DLA 2618-3] smarty3 regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-13982", "datePublished": "2018-09-18T21:00:00", "dateReserved": "2018-07-11T00:00:00", "dateUpdated": "2024-08-05T09:21:40.766Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4437
Vulnerability from cvelistv5
Published
2012-10-01 01:00
Modified
2024-08-06 20:35
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/09/19/1 | mailing-list, x_refsource_MLIST | |
http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html | vendor-advisory, x_refsource_FEDORA | |
http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt | x_refsource_CONFIRM | |
http://advisories.mageia.org/MGASA-2014-0468.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/50589 | third-party-advisory, x_refsource_SECUNIA | |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:221 | vendor-advisory, x_refsource_MANDRIVA | |
http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html | third-party-advisory, x_refsource_JVNDB | |
http://jvn.jp/en/jp/JVN63650108/index.html | third-party-advisory, x_refsource_JVN | |
http://www.openwall.com/lists/oss-security/2012/09/20/3 | mailing-list, x_refsource_MLIST | |
http://www.securityfocus.com/bid/55506 | vdb-entry, x_refsource_BID | |
http://code.google.com/p/smarty-php/source/detail?r=4658 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:35:09.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120919 CVE Request Smarty / php-Smarty: XSS in Smarty exception messages", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/19/1" }, { "name": "FEDORA-2012-14578", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0468.html" }, { "name": "50589", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50589" }, { "name": "MDVSA-2014:221", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221" }, { "name": "JVNDB-2012-000094", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html" }, { "name": "JVN#63650108", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "http://jvn.jp/en/jp/JVN63650108/index.html" }, { "name": "[oss-security] 20120919 Re: CVE Request Smarty / php-Smarty: XSS in Smarty exception messages", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/20/3" }, { "name": "55506", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/55506" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=4658" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-09-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-03-19T15:57:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120919 CVE Request Smarty / php-Smarty: XSS in Smarty exception messages", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/19/1" }, { "name": "FEDORA-2012-14578", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0468.html" }, { "name": "50589", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50589" }, { "name": "MDVSA-2014:221", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221" }, { "name": "JVNDB-2012-000094", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html" }, { "name": "JVN#63650108", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "http://jvn.jp/en/jp/JVN63650108/index.html" }, { "name": "[oss-security] 20120919 Re: CVE Request Smarty / php-Smarty: XSS in Smarty exception messages", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/09/20/3" }, { "name": "55506", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/55506" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=4658" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4437", "datePublished": "2012-10-01T01:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:35:09.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-25047
Vulnerability from cvelistv5
Published
2022-09-14 00:00
Modified
2024-08-05 12:26
Severity ?
EPSS score ?
Summary
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:26:39.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/issues/454" }, { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.2.1" }, { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.47" }, { "tags": [ "x_transferred" ], "url": "https://bugs.gentoo.org/870100" }, { "name": "GLSA-202209-09", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "name": "[debian-lts-announce] 20230105 [SECURITY] [DLA 3262-1] smarty3 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-05T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://github.com/smarty-php/smarty/issues/454" }, { "url": "https://github.com/smarty-php/smarty/releases/tag/v4.2.1" }, { "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.47" }, { "url": "https://bugs.gentoo.org/870100" }, { "name": "GLSA-202209-09", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "name": "[debian-lts-announce] 20230105 [SECURITY] [DLA 3262-1] smarty3 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-25047", "datePublished": "2022-09-14T00:00:00", "dateReserved": "2022-09-14T00:00:00", "dateUpdated": "2024-08-05T12:26:39.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21408
Vulnerability from cvelistv5
Published
2022-01-10 00:00
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0.3, template authors could run restricted static php methods. Users should upgrade to version 3.1.43 or 4.0.3 to receive a patch.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
smarty-php | smarty |
Version: < 3.1.43 Version: >= 4.0.0, < 4.0.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:16.192Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m" }, { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664" }, { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.43" }, { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.3" }, { "name": "[debian-lts-announce] 20220505 [SECURITY] [DLA 2995-1] smarty3 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html" }, { "name": "DSA-5151", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5151" }, { "name": "GLSA-202209-09", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "name": "FEDORA-2022-52154efd61", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/" }, { "name": "FEDORA-2022-d5fc9dcdd7", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "smarty", "vendor": "smarty-php", "versions": [ { "status": "affected", "version": "\u003c 3.1.43" }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0.3, template authors could run restricted static php methods. Users should upgrade to version 3.1.43 or 4.0.3 to receive a patch." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m" }, { "url": "https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664" }, { "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.43" }, { "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.3" }, { "name": "[debian-lts-announce] 20220505 [SECURITY] [DLA 2995-1] smarty3 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html" }, { "name": "DSA-5151", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5151" }, { "name": "GLSA-202209-09", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "name": "FEDORA-2022-52154efd61", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/" }, { "name": "FEDORA-2022-d5fc9dcdd7", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/" } ], "source": { "advisory": "GHSA-4h9c-v5vg-5m6m", "discovery": "UNKNOWN" }, "title": "Access to restricted PHP code by dynamic static class access in smarty" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21408", "datePublished": "2022-01-10T00:00:00", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:16.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-4811
Vulnerability from cvelistv5
Published
2008-10-31 17:18
Modified
2024-08-07 10:31
Severity ?
EPSS score ?
Summary
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/32329 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46406 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/31862 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2008/dsa-1691 | vendor-advisory, x_refsource_DEBIAN | |
http://securityvulns.ru/Udocument746.html | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2008/10/25/2 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:31:27.587Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "32329", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32329" }, { "name": "smarty-expandquotedtext-code-execution1(46406)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46406" }, { "name": "31862", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31862" }, { "name": "DSA-1691", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1691" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://securityvulns.ru/Udocument746.html" }, { "name": "[oss-security] 20081025 Regarding SA32329 (Smarty \"_expand_quoted_text()\" Security Bypass)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-10-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \\ (backslash) before a dollar-sign character." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "32329", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32329" }, { "name": "smarty-expandquotedtext-code-execution1(46406)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46406" }, { "name": "31862", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31862" }, { "name": "DSA-1691", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1691" }, { "tags": [ "x_refsource_MISC" ], "url": "http://securityvulns.ru/Udocument746.html" }, { "name": "[oss-security] 20081025 Regarding SA32329 (Smarty \"_expand_quoted_text()\" Security Bypass)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \\ (backslash) before a dollar-sign character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "32329", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32329" }, { "name": "smarty-expandquotedtext-code-execution1(46406)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46406" }, { "name": "31862", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31862" }, { "name": "DSA-1691", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1691" }, { "name": "http://securityvulns.ru/Udocument746.html", "refsource": "MISC", "url": "http://securityvulns.ru/Udocument746.html" }, { "name": "[oss-security] 20081025 Regarding SA32329 (Smarty \"_expand_quoted_text()\" Security Bypass)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4811", "datePublished": "2008-10-31T17:18:00", "dateReserved": "2008-10-31T00:00:00", "dateUpdated": "2024-08-07T10:31:27.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0913
Vulnerability from cvelistv5
Published
2005-03-29 05:00
Modified
2024-08-07 21:28
Severity ?
EPSS score ?
Summary
Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/14729/ | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/12941 | vdb-entry, x_refsource_BID | |
http://news.php.net/php.smarty.dev/2673 | x_refsource_CONFIRM | |
http://security.gentoo.org/glsa/glsa-200503-35.xml | vendor-advisory, x_refsource_GENTOO | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/19880 | vdb-entry, x_refsource_XF | |
http://securitytracker.com/id?1013556 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:28:28.507Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "14729", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14729/" }, { "name": "12941", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12941" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://news.php.net/php.smarty.dev/2673" }, { "name": "GLSA-200503-35", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200503-35.xml" }, { "name": "smarty-regexreplace-security-bpass(19880)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19880" }, { "name": "1013556", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1013556" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-03-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "14729", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14729/" }, { "name": "12941", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12941" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://news.php.net/php.smarty.dev/2673" }, { "name": "GLSA-200503-35", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200503-35.xml" }, { "name": "smarty-regexreplace-security-bpass(19880)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19880" }, { "name": "1013556", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1013556" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0913", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "14729", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14729/" }, { "name": "12941", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12941" }, { "name": "http://news.php.net/php.smarty.dev/2673", "refsource": "CONFIRM", "url": "http://news.php.net/php.smarty.dev/2673" }, { "name": "GLSA-200503-35", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200503-35.xml" }, { "name": "smarty-regexreplace-security-bpass(19880)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19880" }, { "name": "1013556", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1013556" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0913", "datePublished": "2005-03-29T05:00:00", "dateReserved": "2005-03-29T00:00:00", "dateUpdated": "2024-08-07T21:28:28.507Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-8350
Vulnerability from cvelistv5
Published
2014-11-03 16:00
Modified
2024-08-06 13:18
Severity ?
EPSS score ?
Summary
Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/70708 | vdb-entry, x_refsource_BID | |
http://seclists.org/oss-sec/2014/q4/421 | mailing-list, x_refsource_MLIST | |
https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902 | x_refsource_CONFIRM | |
http://advisories.mageia.org/MGASA-2014-0468.html | x_refsource_CONFIRM | |
http://seclists.org/oss-sec/2014/q4/420 | mailing-list, x_refsource_MLIST | |
http://www.mandriva.com/security/advisories?name=MDVSA-2014:221 | vendor-advisory, x_refsource_MANDRIVA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/97725 | vdb-entry, x_refsource_XF | |
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:18:48.203Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "70708", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/70708" }, { "name": "[oss-security] 20141023 Re: CVE Request: smarty: secure mode bypass", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/421" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://advisories.mageia.org/MGASA-2014-0468.html" }, { "name": "[oss-security] 20141022 CVE Request: smarty: secure mode bypass", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/420" }, { "name": "MDVSA-2014:221", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221" }, { "name": "smarty-cve20148350-code-exec(97725)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-10-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by \"{literal}\u003c{/literal}script language=php\u003e\" in a template." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T15:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "70708", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/70708" }, { "name": "[oss-security] 20141023 Re: CVE Request: smarty: secure mode bypass", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/421" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://advisories.mageia.org/MGASA-2014-0468.html" }, { "name": "[oss-security] 20141022 CVE Request: smarty: secure mode bypass", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2014/q4/420" }, { "name": "MDVSA-2014:221", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221" }, { "name": "smarty-cve20148350-code-exec(97725)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2014-8350", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by \"{literal}\u003c{/literal}script language=php\u003e\" in a template." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "70708", "refsource": "BID", "url": "http://www.securityfocus.com/bid/70708" }, { "name": "[oss-security] 20141023 Re: CVE Request: smarty: secure mode bypass", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/421" }, { "name": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902", "refsource": "CONFIRM", "url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902" }, { "name": "http://advisories.mageia.org/MGASA-2014-0468.html", "refsource": "CONFIRM", "url": "http://advisories.mageia.org/MGASA-2014-0468.html" }, { "name": "[oss-security] 20141022 CVE Request: smarty: secure mode bypass", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2014/q4/420" }, { "name": "MDVSA-2014:221", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221" }, { "name": "smarty-cve20148350-code-exec(97725)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725" }, { "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920", "refsource": "CONFIRM", "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2014-8350", "datePublished": "2014-11-03T16:00:00", "dateReserved": "2014-10-20T00:00:00", "dateUpdated": "2024-08-06T13:18:48.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-16831
Vulnerability from cvelistv5
Published
2018-09-11 13:00
Modified
2024-08-05 10:32
Severity ?
EPSS score ?
Summary
Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.
References
▼ | URL | Tags |
---|---|---|
https://github.com/smarty-php/smarty/issues/486 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T10:32:54.003Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/smarty-php/smarty/issues/486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-09-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-11T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/smarty-php/smarty/issues/486" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-16831", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/smarty-php/smarty/issues/486", "refsource": "MISC", "url": "https://github.com/smarty-php/smarty/issues/486" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-16831", "datePublished": "2018-09-11T13:00:00", "dateReserved": "2018-09-11T00:00:00", "dateUpdated": "2024-08-05T10:32:54.003Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-5052
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-16 22:15
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in Smarty before 3.0.0 beta 6 have unknown impact and attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:24:53.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Smarty before 3.0.0 beta 6 have unknown impact and attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-03T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-5052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Smarty before 3.0.0 beta 6 have unknown impact and attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt", "refsource": "CONFIRM", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-5052", "datePublished": "2011-02-03T16:00:00Z", "dateReserved": "2011-02-03T00:00:00Z", "dateUpdated": "2024-09-16T22:15:52.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4726
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-17 04:00
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the math plugin in Smarty before 3.0.0 RC1 has unknown impact and remote attack vectors. NOTE: this might overlap CVE-2009-1669.
References
▼ | URL | Tags |
---|---|---|
http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:55:34.889Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the math plugin in Smarty before 3.0.0 RC1 has unknown impact and remote attack vectors. NOTE: this might overlap CVE-2009-1669." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-03T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4726", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the math plugin in Smarty before 3.0.0 RC1 has unknown impact and remote attack vectors. NOTE: this might overlap CVE-2009-1669." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt", "refsource": "CONFIRM", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4726", "datePublished": "2011-02-03T16:00:00Z", "dateReserved": "2011-02-03T00:00:00Z", "dateUpdated": "2024-09-17T04:00:03.581Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-28447
Vulnerability from cvelistv5
Published
2023-03-28 20:07
Modified
2025-02-13 16:48
Severity ?
EPSS score ?
Summary
Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
smarty-php | smarty |
Version: >= 4.0.0, < 4.3.1 Version: < 3.1.48 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:38:25.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj" }, { "name": "https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSAUM3YHWHO4UCJXRGRLQGPJAO3MFOZZ/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBB35GLYTL6JL6EOM6BOZNYP47JKNNHT/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7O7SKTATM6GAP45S64QFXNLWIY5I7HP/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "smarty", "vendor": "smarty-php", "versions": [ { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.3.1" }, { "status": "affected", "version": "\u003c 3.1.48" } ] } ], "descriptions": [ { "lang": "en", "value": "Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user\u0027s browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application\u0027s behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-15T03:06:39.782Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj" }, { "name": "https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSAUM3YHWHO4UCJXRGRLQGPJAO3MFOZZ/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBB35GLYTL6JL6EOM6BOZNYP47JKNNHT/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7O7SKTATM6GAP45S64QFXNLWIY5I7HP/" } ], "source": { "advisory": "GHSA-7j98-h7fp-4vwj", "discovery": "UNKNOWN" }, "title": "Cross site scripting vulnerability in Javascript escaping in smarty/smarty" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2023-28447", "datePublished": "2023-03-28T20:07:39.103Z", "dateReserved": "2023-03-15T15:59:10.057Z", "dateUpdated": "2025-02-13T16:48:42.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4723
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-16 20:47
Severity ?
EPSS score ?
Summary
Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:55:35.129Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-03T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4723", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt", "refsource": "CONFIRM", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4723", "datePublished": "2011-02-03T16:00:00Z", "dateReserved": "2011-02-03T00:00:00Z", "dateUpdated": "2024-09-16T20:47:30.850Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26119
Vulnerability from cvelistv5
Published
2021-02-22 01:34
Modified
2024-08-03 20:19
Severity ?
EPSS score ?
Summary
Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.
References
▼ | URL | Tags |
---|---|---|
https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html | mailing-list, x_refsource_MLIST | |
https://security.gentoo.org/glsa/202105-06 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2022/dsa-5151 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.153Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md" }, { "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "name": "GLSA-202105-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202105-06" }, { "name": "DSA-5151", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5151" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-30T10:06:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md" }, { "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "name": "GLSA-202105-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202105-06" }, { "name": "DSA-5151", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2022/dsa-5151" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-26119", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md", "refsource": "MISC", "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md" }, { "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "name": "GLSA-202105-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-06" }, { "name": "DSA-5151", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2022/dsa-5151" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-26119", "datePublished": "2021-02-22T01:34:05", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-08-03T20:19:20.153Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4724
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-17 02:11
Severity ?
EPSS score ?
Summary
Multiple unspecified vulnerabilities in the parser implementation in Smarty before 3.0.0 RC3 have unknown impact and remote attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:55:35.110Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the parser implementation in Smarty before 3.0.0 RC3 have unknown impact and remote attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-03T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4724", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in the parser implementation in Smarty before 3.0.0 RC3 have unknown impact and remote attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt", "refsource": "CONFIRM", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4724", "datePublished": "2011-02-03T16:00:00Z", "dateReserved": "2011-02-03T00:00:00Z", "dateUpdated": "2024-09-17T02:11:11.239Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-29454
Vulnerability from cvelistv5
Published
2022-01-10 00:00
Modified
2024-08-03 22:02
Severity ?
EPSS score ?
Summary
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
smarty-php | smarty |
Version: < 3.1.42 Version: >= 4.0.0, < 4.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:02:51.996Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m" }, { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71" }, { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.42" }, { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.2" }, { "tags": [ "x_transferred" ], "url": "https://packagist.org/packages/smarty/smarty" }, { "tags": [ "x_transferred" ], "url": "https://www.smarty.net/docs/en/language.function.math.tpl" }, { "name": "[debian-lts-announce] 20220505 [SECURITY] [DLA 2995-1] smarty3 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html" }, { "name": "DSA-5151", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5151" }, { "name": "GLSA-202209-09", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "name": "FEDORA-2022-52154efd61", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/" }, { "name": "FEDORA-2022-d5fc9dcdd7", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "smarty", "vendor": "smarty-php", "versions": [ { "status": "affected", "version": "\u003c 3.1.42" }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.0.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-74", "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m" }, { "url": "https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71" }, { "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.42" }, { "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.2" }, { "url": "https://packagist.org/packages/smarty/smarty" }, { "url": "https://www.smarty.net/docs/en/language.function.math.tpl" }, { "name": "[debian-lts-announce] 20220505 [SECURITY] [DLA 2995-1] smarty3 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html" }, { "name": "DSA-5151", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5151" }, { "name": "GLSA-202209-09", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "name": "FEDORA-2022-52154efd61", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/" }, { "name": "FEDORA-2022-d5fc9dcdd7", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/" } ], "source": { "advisory": "GHSA-29gp-2c3m-3j6m", "discovery": "UNKNOWN" }, "title": "Sandbox Escape by math function in smarty" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-29454", "datePublished": "2022-01-10T00:00:00", "dateReserved": "2021-03-30T00:00:00", "dateUpdated": "2024-08-03T22:02:51.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-29221
Vulnerability from cvelistv5
Published
2022-05-24 00:00
Modified
2024-08-03 06:17
Severity ?
EPSS score ?
Summary
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
smarty-php | smarty |
Version: < 3.1.45 Version: >= 4.0.0, < 4.1.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:17:54.199Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-634x-pc3q-cf4c" }, { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/commit/64ad6442ca1da31cefdab5c9874262b702cccddd" }, { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.45" }, { "tags": [ "x_transferred" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.1.1" }, { "name": "[debian-lts-announce] 20220529 [SECURITY] [DLA 3033-1] smarty3 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00044.html" }, { "name": "DSA-5151", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5151" }, { "name": "GLSA-202209-09", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "name": "FEDORA-2022-52154efd61", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/" }, { "name": "FEDORA-2022-d5fc9dcdd7", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "smarty", "vendor": "smarty-php", "versions": [ { "status": "affected", "version": "\u003c 3.1.45" }, { "status": "affected", "version": "\u003e= 4.0.0, \u003c 4.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T00:00:00", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-634x-pc3q-cf4c" }, { "url": "https://github.com/smarty-php/smarty/commit/64ad6442ca1da31cefdab5c9874262b702cccddd" }, { "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.45" }, { "url": "https://github.com/smarty-php/smarty/releases/tag/v4.1.1" }, { "name": "[debian-lts-announce] 20220529 [SECURITY] [DLA 3033-1] smarty3 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00044.html" }, { "name": "DSA-5151", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2022/dsa-5151" }, { "name": "GLSA-202209-09", "tags": [ "vendor-advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "name": "FEDORA-2022-52154efd61", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/" }, { "name": "FEDORA-2022-d5fc9dcdd7", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/" } ], "source": { "advisory": "GHSA-634x-pc3q-cf4c", "discovery": "UNKNOWN" }, "title": "PHP Code Injection by malicious block or filename in Smarty" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-29221", "datePublished": "2022-05-24T00:00:00", "dateReserved": "2022-04-13T00:00:00", "dateUpdated": "2024-08-03T06:17:54.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-41661
Vulnerability from cvelistv5
Published
2023-09-29 13:36
Modified
2024-08-02 19:01
Severity ?
EPSS score ?
Summary
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin <= 3.1.35 versions.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
PressPage Entertainment Inc. | Smarty for WordPress |
Version: n/a < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:01:35.433Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://patchstack.com/database/vulnerability/smarty-for-wordpress/wordpress-smarty-for-wordpress-plugin-3-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "packageName": "smarty-for-wordpress", "product": "Smarty for WordPress", "vendor": "PressPage Entertainment Inc.", "versions": [ { "lessThanOrEqual": "3.1.35", "status": "affected", "version": "n/a", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Prasanna V Balaji (Patchstack Alliance)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin \u0026lt;=\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;3.1.35 versions.\u003c/span\u003e" } ], "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin \u003c=\u00a03.1.35 versions." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-29T13:36:29.118Z", "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", "shortName": "Patchstack" }, "references": [ { "tags": [ "vdb-entry" ], "url": "https://patchstack.com/database/vulnerability/smarty-for-wordpress/wordpress-smarty-for-wordpress-plugin-3-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve" } ], "source": { "discovery": "EXTERNAL" }, "title": "WordPress Smarty for WordPress Plugin \u003c= 3.1.35 is vulnerable to Cross Site Scripting (XSS)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", "assignerShortName": "Patchstack", "cveId": "CVE-2023-41661", "datePublished": "2023-09-29T13:36:29.118Z", "dateReserved": "2023-08-30T13:02:41.615Z", "dateUpdated": "2024-08-02T19:01:35.433Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26120
Vulnerability from cvelistv5
Published
2021-02-22 01:38
Modified
2024-08-03 20:19
Severity ?
EPSS score ?
Summary
Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring.
References
▼ | URL | Tags |
---|---|---|
https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html | mailing-list, x_refsource_MLIST | |
https://security.gentoo.org/glsa/202105-06 | vendor-advisory, x_refsource_GENTOO | |
https://www.debian.org/security/2022/dsa-5151 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.027Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md" }, { "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "name": "GLSA-202105-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202105-06" }, { "name": "DSA-5151", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2022/dsa-5151" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-30T10:06:08", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md" }, { "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "name": "GLSA-202105-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202105-06" }, { "name": "DSA-5151", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2022/dsa-5151" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-26120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md", "refsource": "MISC", "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md" }, { "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "name": "GLSA-202105-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202105-06" }, { "name": "DSA-5151", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2022/dsa-5151" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-26120", "datePublished": "2021-02-22T01:38:15", "dateReserved": "2021-01-25T00:00:00", "dateUpdated": "2024-08-03T20:19:20.027Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-5054
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-17 01:35
Severity ?
EPSS score ?
Summary
Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations.
References
▼ | URL | Tags |
---|---|---|
http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:24:54.055Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-03T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-5054", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt", "refsource": "CONFIRM", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-5054", "datePublished": "2011-02-03T16:00:00Z", "dateReserved": "2011-02-03T00:00:00Z", "dateUpdated": "2024-09-17T01:35:52.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-1000480
Vulnerability from cvelistv5
Published
2018-01-03 18:00
Modified
2024-08-05 22:00
Severity ?
EPSS score ?
Summary
Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.
References
▼ | URL | Tags |
---|---|---|
https://www.debian.org/security/2018/dsa-4094 | vendor-advisory, x_refsource_DEBIAN | |
https://github.com/smarty-php/smarty/blob/master/change_log.txt | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html | mailing-list, x_refsource_MLIST | |
https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:00:41.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-4094", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4094" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/smarty-php/smarty/blob/master/change_log.txt" }, { "name": "[debian-lts-announce] 20180119 [SECURITY] [DLA 1249-1] smarty3 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html" }, { "name": "[debian-lts-announce] 20180201 [SECURITY] [DLA 1249-2] smarty3 regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2017-12-29T00:00:00", "datePublic": "2018-01-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-02T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-4094", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4094" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/smarty-php/smarty/blob/master/change_log.txt" }, { "name": "[debian-lts-announce] 20180119 [SECURITY] [DLA 1249-1] smarty3 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html" }, { "name": "[debian-lts-announce] 20180201 [SECURITY] [DLA 1249-2] smarty3 regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_ASSIGNED": "2017-12-29", "ID": "CVE-2017-1000480", "REQUESTER": "daniel@scrt.ch", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-4094", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4094" }, { "name": "https://github.com/smarty-php/smarty/blob/master/change_log.txt", "refsource": "MISC", "url": "https://github.com/smarty-php/smarty/blob/master/change_log.txt" }, { "name": "[debian-lts-announce] 20180119 [SECURITY] [DLA 1249-1] smarty3 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html" }, { "name": "[debian-lts-announce] 20180201 [SECURITY] [DLA 1249-2] smarty3 regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-1000480", "datePublished": "2018-01-03T18:00:00", "dateReserved": "2018-01-03T00:00:00", "dateUpdated": "2024-08-05T22:00:41.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-1669
Vulnerability from cvelistv5
Published
2009-05-18 18:00
Modified
2024-08-07 05:20
Severity ?
EPSS score ?
Summary
The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/50457 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/35072 | third-party-advisory, x_refsource_SECUNIA | |
http://www.ubuntu.com/usn/usn-791-3 | vendor-advisory, x_refsource_UBUNTU | |
http://osvdb.org/54380 | vdb-entry, x_refsource_OSVDB | |
https://www.exploit-db.com/exploits/8659 | exploit, x_refsource_EXPLOIT-DB | |
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html | vendor-advisory, x_refsource_FEDORA | |
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html | vendor-advisory, x_refsource_FEDORA | |
http://secunia.com/advisories/35219 | third-party-advisory, x_refsource_SECUNIA | |
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/34918 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:20:35.190Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "smarty-smartyfunctionmath-cmd-execution(50457)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50457" }, { "name": "35072", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35072" }, { "name": "USN-791-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-791-3" }, { "name": "54380", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/54380" }, { "name": "8659", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/8659" }, { "name": "FEDORA-2009-5520", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html" }, { "name": "FEDORA-2009-5516", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html" }, { "name": "35219", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35219" }, { "name": "FEDORA-2009-5525", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html" }, { "name": "34918", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34918" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-05-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "smarty-smartyfunctionmath-cmd-execution(50457)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50457" }, { "name": "35072", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35072" }, { "name": "USN-791-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-791-3" }, { "name": "54380", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/54380" }, { "name": "8659", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/8659" }, { "name": "FEDORA-2009-5520", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html" }, { "name": "FEDORA-2009-5516", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html" }, { "name": "35219", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35219" }, { "name": "FEDORA-2009-5525", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html" }, { "name": "34918", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34918" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1669", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "smarty-smartyfunctionmath-cmd-execution(50457)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50457" }, { "name": "35072", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35072" }, { "name": "USN-791-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-791-3" }, { "name": "54380", "refsource": "OSVDB", "url": "http://osvdb.org/54380" }, { "name": "8659", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/8659" }, { "name": "FEDORA-2009-5520", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html" }, { "name": "FEDORA-2009-5516", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html" }, { "name": "35219", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35219" }, { "name": "FEDORA-2009-5525", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html" }, { "name": "34918", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34918" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1669", "datePublished": "2009-05-18T18:00:00", "dateReserved": "2009-05-18T00:00:00", "dateUpdated": "2024-08-07T05:20:35.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4722
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-16 20:52
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:55:35.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-03T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4722", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt", "refsource": "CONFIRM", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4722", "datePublished": "2011-02-03T16:00:00Z", "dateReserved": "2011-02-03T00:00:00Z", "dateUpdated": "2024-09-16T20:52:41.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4725
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-16 22:10
Severity ?
EPSS score ?
Summary
Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:55:34.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-03T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4725", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt", "refsource": "CONFIRM", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4725", "datePublished": "2011-02-03T16:00:00Z", "dateReserved": "2011-02-03T00:00:00Z", "dateUpdated": "2024-09-16T22:10:28.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-5053
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-17 00:45
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file.
References
▼ | URL | Tags |
---|---|---|
http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:24:54.093Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-03T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-5053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt", "refsource": "CONFIRM", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-5053", "datePublished": "2011-02-03T16:00:00Z", "dateReserved": "2011-02-03T00:00:00Z", "dateUpdated": "2024-09-17T00:45:39.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-4277
Vulnerability from cvelistv5
Published
2012-08-13 22:00
Modified
2024-09-17 01:51
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the smarty_function_html_options_optoutput function in distribution/libs/plugins/function.html_options.php in Smarty before 3.1.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id?1027061 | vdb-entry, x_refsource_SECTRACK | |
http://code.google.com/p/smarty-php/issues/detail?id=98&can=1 | x_refsource_MISC | |
http://secunia.com/advisories/49164 | third-party-advisory, x_refsource_SECUNIA | |
http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt | x_refsource_CONFIRM | |
http://code.google.com/p/smarty-php/source/detail?r=4612 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:28:07.808Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1027061", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027061" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://code.google.com/p/smarty-php/issues/detail?id=98\u0026can=1" }, { "name": "49164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49164" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=4612" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the smarty_function_html_options_optoutput function in distribution/libs/plugins/function.html_options.php in Smarty before 3.1.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-08-13T22:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1027061", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027061" }, { "tags": [ "x_refsource_MISC" ], "url": "http://code.google.com/p/smarty-php/issues/detail?id=98\u0026can=1" }, { "name": "49164", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49164" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=4612" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-4277", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the smarty_function_html_options_optoutput function in distribution/libs/plugins/function.html_options.php in Smarty before 3.1.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1027061", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1027061" }, { "name": "http://code.google.com/p/smarty-php/issues/detail?id=98\u0026can=1", "refsource": "MISC", "url": "http://code.google.com/p/smarty-php/issues/detail?id=98\u0026can=1" }, { "name": "49164", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49164" }, { "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt", "refsource": "CONFIRM", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "name": "http://code.google.com/p/smarty-php/source/detail?r=4612", "refsource": "CONFIRM", "url": "http://code.google.com/p/smarty-php/source/detail?r=4612" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-4277", "datePublished": "2012-08-13T22:00:00Z", "dateReserved": "2012-08-13T00:00:00Z", "dateUpdated": "2024-09-17T01:51:08.501Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-7105
Vulnerability from cvelistv5
Published
2007-03-03 21:00
Modified
2025-01-17 14:15
Severity ?
EPSS score ?
Summary
PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter. NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/29603 | vdb-entry, x_refsource_XF | |
http://www.security-express.com/archives/fulldisclosure/2006-10/0292.html | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/bid/20557 | vdb-entry, x_refsource_BID | |
http://www.security-express.com/archives/fulldisclosure/2006-10/0299.html | mailing-list, x_refsource_FULLDISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:50:06.040Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "smarty-smarty-file-include(29603)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29603" }, { "name": "20061014 Vuln", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0292.html" }, { "name": "20557", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20557" }, { "name": "20061014 Re: Vuln", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0299.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2006-7105", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-15T20:11:18.637677Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-17T14:15:54.762Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter. NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "smarty-smarty-file-include(29603)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29603" }, { "name": "20061014 Vuln", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0292.html" }, { "name": "20557", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20557" }, { "name": "20061014 Re: Vuln", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0299.html" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-7105", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter. NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "smarty-smarty-file-include(29603)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29603" }, { "name": "20061014 Vuln", "refsource": "FULLDISC", "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0292.html" }, { "name": "20557", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20557" }, { "name": "20061014 Re: Vuln", "refsource": "FULLDISC", "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0299.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-7105", "datePublished": "2007-03-03T21:00:00", "dateReserved": "2007-03-03T00:00:00", "dateUpdated": "2025-01-17T14:15:54.762Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-4810
Vulnerability from cvelistv5
Published
2008-10-31 17:18
Modified
2024-08-07 10:31
Severity ?
EPSS score ?
Summary
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/32329 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/31862 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/46031 | vdb-entry, x_refsource_XF | |
http://www.debian.org/security/2008/dsa-1691 | vendor-advisory, x_refsource_DEBIAN | |
http://code.google.com/p/smarty-php/source/detail?r=2784&path=/trunk/libs/Smarty_Compiler.class.php | x_refsource_CONFIRM | |
http://securityvulns.ru/Udocument746.html | x_refsource_MISC | |
https://bugs.gentoo.org/attachment.cgi?id=169804&action=view | x_refsource_CONFIRM | |
http://smarty-php.googlecode.com/svn/trunk/NEWS | x_refsource_CONFIRM | |
http://code.google.com/p/smarty-php/source/detail?r=2797&path=/trunk/libs/Smarty_Compiler.class.php | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2008/10/25/2 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:31:27.520Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "32329", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32329" }, { "name": "31862", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31862" }, { "name": "smarty-expandquotedtext-code-execution(46031)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46031" }, { "name": "DSA-1691", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1691" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=2784\u0026path=/trunk/libs/Smarty_Compiler.class.php" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://securityvulns.ru/Udocument746.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.gentoo.org/attachment.cgi?id=169804\u0026action=view" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://smarty-php.googlecode.com/svn/trunk/NEWS" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=2797\u0026path=/trunk/libs/Smarty_Compiler.class.php" }, { "name": "[oss-security] 20081025 Regarding SA32329 (Smarty \"_expand_quoted_text()\" Security Bypass)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka \"php executed in templates;\" and (2) a double quoted literal string, aka a \"function injection security hole.\" NOTE: each vector affects slightly different SVN revisions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "32329", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32329" }, { "name": "31862", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31862" }, { "name": "smarty-expandquotedtext-code-execution(46031)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46031" }, { "name": "DSA-1691", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1691" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=2784\u0026path=/trunk/libs/Smarty_Compiler.class.php" }, { "tags": [ "x_refsource_MISC" ], "url": "http://securityvulns.ru/Udocument746.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.gentoo.org/attachment.cgi?id=169804\u0026action=view" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://smarty-php.googlecode.com/svn/trunk/NEWS" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=2797\u0026path=/trunk/libs/Smarty_Compiler.class.php" }, { "name": "[oss-security] 20081025 Regarding SA32329 (Smarty \"_expand_quoted_text()\" Security Bypass)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4810", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka \"php executed in templates;\" and (2) a double quoted literal string, aka a \"function injection security hole.\" NOTE: each vector affects slightly different SVN revisions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "32329", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32329" }, { "name": "31862", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31862" }, { "name": "smarty-expandquotedtext-code-execution(46031)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46031" }, { "name": "DSA-1691", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1691" }, { "name": "http://code.google.com/p/smarty-php/source/detail?r=2784\u0026path=/trunk/libs/Smarty_Compiler.class.php", "refsource": "CONFIRM", "url": "http://code.google.com/p/smarty-php/source/detail?r=2784\u0026path=/trunk/libs/Smarty_Compiler.class.php" }, { "name": "http://securityvulns.ru/Udocument746.html", "refsource": "MISC", "url": "http://securityvulns.ru/Udocument746.html" }, { "name": "https://bugs.gentoo.org/attachment.cgi?id=169804\u0026action=view", "refsource": "CONFIRM", "url": "https://bugs.gentoo.org/attachment.cgi?id=169804\u0026action=view" }, { "name": "http://smarty-php.googlecode.com/svn/trunk/NEWS", "refsource": "CONFIRM", "url": "http://smarty-php.googlecode.com/svn/trunk/NEWS" }, { "name": "http://code.google.com/p/smarty-php/source/detail?r=2797\u0026path=/trunk/libs/Smarty_Compiler.class.php", "refsource": "CONFIRM", "url": "http://code.google.com/p/smarty-php/source/detail?r=2797\u0026path=/trunk/libs/Smarty_Compiler.class.php" }, { "name": "[oss-security] 20081025 Regarding SA32329 (Smarty \"_expand_quoted_text()\" Security Bypass)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4810", "datePublished": "2008-10-31T17:18:00", "dateReserved": "2008-10-31T00:00:00", "dateUpdated": "2024-08-07T10:31:27.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-4727
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-16 17:39
Severity ?
EPSS score ?
Summary
Smarty before 3.0.0 beta 7 does not properly handle the <?php and ?> tags, which has unspecified impact and remote attack vectors.
References
▼ | URL | Tags |
---|---|---|
http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:55:34.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Smarty before 3.0.0 beta 7 does not properly handle the \u003c?php and ?\u003e tags, which has unspecified impact and remote attack vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-02-03T16:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-4727", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Smarty before 3.0.0 beta 7 does not properly handle the \u003c?php and ?\u003e tags, which has unspecified impact and remote attack vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt", "refsource": "CONFIRM", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-4727", "datePublished": "2011-02-03T16:00:00Z", "dateReserved": "2011-02-03T00:00:00Z", "dateUpdated": "2024-09-16T17:39:15.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-1028
Vulnerability from cvelistv5
Published
2019-11-20 14:45
Modified
2024-08-06 22:14
Severity ?
EPSS score ?
Summary
The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.
References
▼ | URL | Tags |
---|---|---|
https://security-tracker.debian.org/tracker/CVE-2011-1028 | x_refsource_MISC | |
https://access.redhat.com/security/cve/cve-2011-1028 | x_refsource_MISC | |
https://seclists.org/oss-sec/2011/q1/313 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:14:27.221Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1028" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2011-1028" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://seclists.org/oss-sec/2011/q1/313" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "smarty3", "vendor": "smarty3", "versions": [ { "status": "affected", "version": "3" } ] } ], "datePublic": "2011-12-12T00:00:00", "descriptions": [ { "lang": "en", "value": "The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file." } ], "problemTypes": [ { "descriptions": [ { "description": "UNKNOWN_TYPE", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-20T14:45:10", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1028" }, { "tags": [ "x_refsource_MISC" ], "url": "https://access.redhat.com/security/cve/cve-2011-1028" }, { "tags": [ "x_refsource_MISC" ], "url": "https://seclists.org/oss-sec/2011/q1/313" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-1028", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "smarty3", "version": { "version_data": [ { "version_value": "3" } ] } } ] }, "vendor_name": "smarty3" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UNKNOWN_TYPE" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2011-1028", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2011-1028" }, { "name": "https://access.redhat.com/security/cve/cve-2011-1028", "refsource": "MISC", "url": "https://access.redhat.com/security/cve/cve-2011-1028" }, { "name": "https://seclists.org/oss-sec/2011/q1/313", "refsource": "MISC", "url": "https://seclists.org/oss-sec/2011/q1/313" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1028", "datePublished": "2019-11-20T14:45:10", "dateReserved": "2011-02-14T00:00:00", "dateUpdated": "2024-08-06T22:14:27.221Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2008-02-28 20:44
Modified
2024-11-21 00:43
Severity ?
Summary
The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "B305BAAF-5CF8-4A5C-8E59-B308A754A3A8", "versionEndIncluding": "2.6.18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a \u0027\\0\u0027 character in a search string." }, { "lang": "es", "value": "La extensi\u00f3n modifier.regex_replace.php de Smarty before 2.6.19,utilizado como Serendipity (S9Y) y otros productos, permite a atacantes llamar a funciones PHP de su elecci\u00f3n a trav\u00e9s de plantillas, relacionado con un car\u00e1cter \u0027\\0\u0027 en una cadena de b\u00fasqueda." } ], "id": "CVE-2008-1066", "lastModified": "2024-11-21T00:43:35.630", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-02-28T20:44:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29241" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29392" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29398" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29405" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29562" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29839" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201111-04.xml" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1520" }, { "source": "cve@mitre.org", "url": "http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28105" }, { "source": "cve@mitre.org", "url": "http://www.smarty.net/misc/NEWS" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41002" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29398" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29405" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201111-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.smarty.net/misc/NEWS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-03-03 21:19
Modified
2025-01-17 15:15
Severity ?
Summary
PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter. NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter. NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect" }, { "lang": "es", "value": "** IMPUGNADA ** Vulnerabilidad PHP de inclusi\u00f3n remota de archivo en libs/Smarty.class.php en Smarty 2.6.9 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de una URL en el par\u00e1metro filename. NOTA: \t\r\nen el acceso original, el nombre de fichero se utiliza en una definici\u00f3n de la funci\u00f3n, as\u00ed que este informe es probablemente incorrecto." } ], "id": "CVE-2006-7105", "lastModified": "2025-01-17T15:15:08.970", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2007-03-03T21:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0292.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0299.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/20557" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0292.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0299.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/20557" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29603" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2009-05-18 18:30
Modified
2024-11-21 01:03
Severity ?
Summary
The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "La funci\u00f3n smarty_function_math en libs/plugins/function.math.php en Smarty v2.6.22 permite que atacantes, dependiendo del contexto, ejecutar comandos de su elecci\u00f3n a trav\u00e9s de metacaracteres en el atributo equation de la funci\u00f3n math. NOTE: algunos de esos detalles se han obtenido de informaci\u00f3n de terceros." } ], "evaluatorImpact": "Per http://secunia.com/advisories/35072\r\n\"The vulnerability is confirmed in version 2.6.22 on Windows. Other versions may also be affected.\"", "id": "CVE-2009-1669", "lastModified": "2024-11-21T01:03:02.520", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-05-18T18:30:00.967", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/54380" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35072" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/35219" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/34918" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-791-3" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50457" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/8659" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/54380" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/34918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-791-3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/8659" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:11
Severity ?
Summary
Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "9636F3D4-31B1-4308-AA00-6B3B4CA12B53", "versionEndIncluding": "2.6.26", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations." }, { "lang": "es", "value": "El motor de plantillas PHP Smarty en versiones anteriores a la v3.0.0 beta 4 no tiene en cuenta el valor de umask a la hora de establecer los permisos de los archivos, lo que podr\u00eda permitir eludir restricciones de acceso previsto a trav\u00e9s de operaciones del sistema de archivos est\u00e1ndar." } ], "id": "CVE-2009-5054", "lastModified": "2024-11-21T01:11:04.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-03T17:00:01.837", "references": [ { "source": "cve@mitre.org", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-11 13:29
Modified
2024-11-21 03:53
Severity ?
Summary
Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/smarty-php/smarty/issues/486 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/smarty-php/smarty/issues/486 | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "06EEAC1A-30EB-45A0-9533-56BE9A1A93C5", "versionEndIncluding": "3.1.32", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement." }, { "lang": "es", "value": "Smarty en versiones anteriores a la 3.1.33-dev-4 permite que los atacantes omitan el mecanismo de protecci\u00f3n trusted_dir mediante una subcadena file:./../ en una instrucci\u00f3n include." } ], "id": "CVE-2018-16831", "lastModified": "2024-11-21T03:53:24.283", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-11T13:29:01.293", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/issues/486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/issues/486" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-10-01 03:26
Modified
2024-11-21 01:42
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F60BF56B-7165-456C-B7D1-AF6E869B7337", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "A46B316A-0D93-4B17-AFF7-C52FFFF361FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "3DC9CDED-796C-4081-83DD-7AE59700FF39", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0AA427E6-AE83-4227-B45B-BD84569ACA2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8C8DB2D9-9D3D-4F01-869F-AA5BEB2891DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9FE6E86E-623A-4136-9945-1E99629916B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A55A97A-FD19-4385-92D7-D511D53EE38C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8F7BBD2A-45A1-4C98-9C73-DBBF2161BE29", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CB86C08-AE24-4B3C-90FE-917996A0A48C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "DADDE896-B711-4ECD-B560-E9665B178173", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "293032B8-72CB-4201-901E-3A70613B7518", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA2F1ACE-C3BD-4DEA-A317-38CD4928A781", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "469D55FF-5436-4000-8FF3-B3761761A429", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "34C390AB-D6A6-4ABF-AA1E-A9294AC2FD70", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "21D02454-647C-43B9-9DAC-A0306FB52F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FF0159CD-A5A9-4C7A-9EDC-9A6BC8740847", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "AB73E7D4-A784-41EF-8DC8-3BF9245A549D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "0BD8A9C9-FFA8-46E8-874C-F5A31A785102", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "FE74F83B-33BB-4303-A022-51422BFBB8C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "D780E5BB-4DC5-4E7C-A1B5-FE6E9E75B5D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "0CE55049-426E-4B43-8A55-A643B423A921", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "88CDDA12-5690-442E-A893-47E9E2E60617", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D731309D-2418-4382-B565-E74C4593527F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "3C9A9770-5A48-45D8-A3E3-16867CED4B2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en la clase SmartyException en Smarty (tambi\u00e9n conocido como smarty-php), antes de v3.1.12, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados que desencadenan una excepci\u00f3n Smarty." } ], "id": "CVE-2012-4437", "lastModified": "2024-11-21T01:42:53.733", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-10-01T03:26:16.413", "references": [ { "source": "secalert@redhat.com", "url": "http://advisories.mageia.org/MGASA-2014-0468.html" }, { "source": "secalert@redhat.com", "url": "http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=4658" }, { "source": "secalert@redhat.com", "url": "http://jvn.jp/en/jp/JVN63650108/index.html" }, { "source": "secalert@redhat.com", "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html" }, { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/50589" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/09/19/1" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/09/20/3" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/55506" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2014-0468.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=4658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvn.jp/en/jp/JVN63650108/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/50589" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/09/19/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/09/20/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/55506" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-24 15:15
Modified
2024-11-21 06:58
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
smarty | smarty | * | |
smarty | smarty | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
fedoraproject | fedora | 36 | |
fedoraproject | fedora | 37 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "8429DA48-CC42-447B-9273-9755C7A33248", "versionEndExcluding": "3.1.45", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECF0778C-6739-4DE6-BB51-B6B466C0B104", "versionEndExcluding": "4.1.1", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds." }, { "lang": "es", "value": "Smarty es un motor de plantillas para PHP, que facilita la separaci\u00f3n de la presentaci\u00f3n (HTML/CSS) de la l\u00f3gica de la aplicaci\u00f3n. En versiones anteriores a 3.1.45 y 4.1.1, los autores de plantillas pod\u00edan inyectar c\u00f3digo php eligiendo un nombre de archivo {block} o {include} malicioso. Los sitios que no pueden confiar plenamente en los autores de plantillas deben actualizar a versiones 3.1.45 o 4.1.1 para recibir un parche para este problema. Actualmente no se presentan mitigaciones conocidas" } ], "id": "CVE-2022-29221", "lastModified": "2024-11-21T06:58:44.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-24T15:15:07.917", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/64ad6442ca1da31cefdab5c9874262b702cccddd" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.45" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.1.1" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-634x-pc3q-cf4c" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00044.html" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/64ad6442ca1da31cefdab5c9874262b702cccddd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.1.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-634x-pc3q-cf4c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5151" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-20 15:15
Modified
2024-11-21 01:25
Severity ?
Summary
The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.
References
▼ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | https://access.redhat.com/security/cve/cve-2011-1028 | Broken Link | |
secalert@redhat.com | https://seclists.org/oss-sec/2011/q1/313 | Mailing List, Third Party Advisory | |
secalert@redhat.com | https://security-tracker.debian.org/tracker/CVE-2011-1028 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/cve-2011-1028 | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/oss-sec/2011/q1/313 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-tracker.debian.org/tracker/CVE-2011-1028 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
smarty | smarty | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7D0F21F-BBEF-4104-A994-A7C67B18AA70", "versionEndExcluding": "3.0.7", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file." }, { "lang": "es", "value": "La variable $smarty.template en Smarty3 permite a atacantes posiblemente ejecutar c\u00f3digo PHP arbitrario por medio del archivo sysplugins/smarty_internal_compile_private_special_variable.php." } ], "id": "CVE-2011-1028", "lastModified": "2024-11-21T01:25:21.757", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-20T15:15:11.023", "references": [ { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "https://access.redhat.com/security/cve/cve-2011-1028" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/oss-sec/2011/q1/313" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://access.redhat.com/security/cve/cve-2011-1028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/oss-sec/2011/q1/313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2011-1028" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-10 20:15
Modified
2024-11-21 06:01
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
smarty | smarty | * | |
smarty | smarty | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
fedoraproject | fedora | 36 | |
fedoraproject | fedora | 37 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F2A8FC7-D5C2-4D88-A172-000065020043", "versionEndExcluding": "3.1.42", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "C66B5163-B419-4BBF-8F97-C6CFEB9CB37A", "versionEndExcluding": "4.0.2", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch." }, { "lang": "es", "value": "Smarty es un motor de plantillas para PHP que facilita la separaci\u00f3n de la presentaci\u00f3n (HTML/CSS) de la l\u00f3gica de la aplicaci\u00f3n. Antes de las versiones 3.1.42 y 4.0.2, los autores de plantillas pod\u00edan ejecutar c\u00f3digo PHP arbitrario al dise\u00f1ar una cadena matem\u00e1tica maliciosa. Si era pasada una cadena matem\u00e1tica como datos proporcionados por el usuario a la funci\u00f3n matem\u00e1tica, los usuarios externos pod\u00edan ejecutar c\u00f3digo PHP arbitrario al dise\u00f1ar una cadena matem\u00e1tica maliciosa. Los usuarios deben actualizar a la versi\u00f3n 3.1.42 o 4.0.2 para recibir un parche" } ], "id": "CVE-2021-29454", "lastModified": "2024-11-21T06:01:08.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-10T20:15:08.000", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.42" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.2" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/" }, { "source": "security-advisories@github.com", "tags": [ "Product", "Third Party Advisory" ], "url": "https://packagist.org/packages/smarty/smarty" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5151" }, { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://www.smarty.net/docs/en/language.function.math.tpl" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://packagist.org/packages/smarty/smarty" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.smarty.net/docs/en/language.function.math.tpl" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-04-12 19:19
Modified
2024-11-21 00:24
Severity ?
Summary
PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter. NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter. NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant" }, { "lang": "es", "value": "** IMPUGNADO ** Vulnerabilidad de inclusi\u00f3n remota de archivo en PHP en unit_test/test_cases.php en Smarty 2.6.1 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro SMARTY_DIR.\r\nNOTA: esta vulnerabilidad se impugna por CVE y una tercera parte porque SMARTY_DIR es una constante." } ], "id": "CVE-2006-7193", "lastModified": "2024-11-21T00:24:36.423", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-04-12T19:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://marc.info/?l=bugtraq\u0026m=116163668213491\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://marc.info/?l=bugtraq\u0026m=116170769322920\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/31096" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://marc.info/?l=bugtraq\u0026m=116163668213491\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://marc.info/?l=bugtraq\u0026m=116170769322920\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/31096" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29739" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:11
Severity ?
Summary
Multiple unspecified vulnerabilities in Smarty before 3.0.0 beta 6 have unknown impact and attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:beta5:*:*:*:*:*:*", "matchCriteriaId": "742E17E7-7859-4D73-84C1-9BB236F06CD7", "versionEndIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Smarty before 3.0.0 beta 6 have unknown impact and attack vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en versiones de Smarty anteriores a la v3.0.0 beta 6 tienen un impacto desconocido y vectores de ataque." } ], "id": "CVE-2009-5052", "lastModified": "2024-11-21T01:11:04.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-03T17:00:01.727", "references": [ { "source": "cve@mitre.org", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:21
Severity ?
Summary
Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:rc4:*:*:*:*:*:*", "matchCriteriaId": "7C07EACF-81E3-4102-883C-BE55B2F832A9", "versionEndIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "A46B316A-0D93-4B17-AFF7-C52FFFF361FE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors." }, { "lang": "es", "value": "El motor de plantillas PHP Smarty v3.0.0, cuando la seguridad est\u00e1 habilitada, no impide el acceso a los miembros tanto de los objetos (1) din\u00e1micos como (2) privados de un objeto asignado, lo cual tiene un impacto no especificado y vectores de ataque a distancia." } ], "id": "CVE-2010-4723", "lastModified": "2024-11-21T01:21:36.683", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-03T17:00:01.947", "references": [ { "source": "cve@mitre.org", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-03-28 21:15
Modified
2024-11-21 07:55
Severity ?
7.1 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
6.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Summary
Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
smarty | smarty | * | |
smarty | smarty | * | |
fedoraproject | fedora | 36 | |
fedoraproject | fedora | 37 | |
fedoraproject | fedora | 38 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E84A24D-C1B5-4218-A407-96D45BDB859D", "versionEndExcluding": "3.1.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "20285F83-0020-4AF8-BD31-CFCA7E02B630", "versionEndExcluding": "4.3.1", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user\u0027s browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application\u0027s behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability." } ], "id": "CVE-2023-28447", "lastModified": "2024-11-21T07:55:05.890", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-03-28T21:15:11.127", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSAUM3YHWHO4UCJXRGRLQGPJAO3MFOZZ/" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBB35GLYTL6JL6EOM6BOZNYP47JKNNHT/" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7O7SKTATM6GAP45S64QFXNLWIY5I7HP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSAUM3YHWHO4UCJXRGRLQGPJAO3MFOZZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBB35GLYTL6JL6EOM6BOZNYP47JKNNHT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7O7SKTATM6GAP45S64QFXNLWIY5I7HP/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-13 22:55
Modified
2024-11-21 01:42
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the smarty_function_html_options_optoutput function in distribution/libs/plugins/function.html_options.php in Smarty before 3.1.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA09B71B-B1EE-42E9-891C-A023FB731798", "versionEndIncluding": "3.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F60BF56B-7165-456C-B7D1-AF6E869B7337", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "A46B316A-0D93-4B17-AFF7-C52FFFF361FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "3DC9CDED-796C-4081-83DD-7AE59700FF39", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0AA427E6-AE83-4227-B45B-BD84569ACA2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8C8DB2D9-9D3D-4F01-869F-AA5BEB2891DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9FE6E86E-623A-4136-9945-1E99629916B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A55A97A-FD19-4385-92D7-D511D53EE38C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8F7BBD2A-45A1-4C98-9C73-DBBF2161BE29", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CB86C08-AE24-4B3C-90FE-917996A0A48C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "DADDE896-B711-4ECD-B560-E9665B178173", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "293032B8-72CB-4201-901E-3A70613B7518", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA2F1ACE-C3BD-4DEA-A317-38CD4928A781", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "469D55FF-5436-4000-8FF3-B3761761A429", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "34C390AB-D6A6-4ABF-AA1E-A9294AC2FD70", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "21D02454-647C-43B9-9DAC-A0306FB52F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FF0159CD-A5A9-4C7A-9EDC-9A6BC8740847", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "AB73E7D4-A784-41EF-8DC8-3BF9245A549D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "0BD8A9C9-FFA8-46E8-874C-F5A31A785102", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the smarty_function_html_options_optoutput function in distribution/libs/plugins/function.html_options.php in Smarty before 3.1.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors." }, { "lang": "es", "value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en la funci\u00f3n smarty_function_html_options_optoutput en distribution/libs/plugins/function.html_options.php en Smarty antes de v3.1.8 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados.\r\n" } ], "id": "CVE-2012-4277", "lastModified": "2024-11-21T01:42:36.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-08-13T22:55:01.770", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://code.google.com/p/smarty-php/issues/detail?id=98\u0026can=1" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=4612" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49164" }, { "source": "cve@mitre.org", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1027061" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://code.google.com/p/smarty-php/issues/detail?id=98\u0026can=1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://code.google.com/p/smarty-php/source/detail?r=4612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027061" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-18 21:29
Modified
2024-11-21 03:48
Severity ?
Summary
Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
smarty | smarty | * | |
debian | debian_linux | 9.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "0613AA6E-3478-438E-974B-88FF5DC03791", "versionEndExcluding": "3.1.33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files." }, { "lang": "es", "value": "Smarty_Security::isTrustedResourceDir() en Smarty en versiones anteriores a la 3.1.33 es propenso a una vulnerabilidad de salto de directorio debido al saneamiento insuficiente de c\u00f3digos de plantilla. Esto permite que los atacantes que controlan el c\u00f3digo de plantilla ejecutado omitan las restricciones de seguridad del directorio de confianza y lean archivos arbitrarios." } ], "id": "CVE-2018-13982", "lastModified": "2024-11-21T03:48:22.357", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-18T21:29:02.247", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-22 02:15
Modified
2024-11-21 05:55
Severity ?
Summary
Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
smarty | smarty | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC1FB377-4E78-4086-BCA1-0B6805311AA7", "versionEndExcluding": "3.1.39", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring." }, { "lang": "es", "value": "Smarty versiones anteriores a 3.1.39, permite una inyecci\u00f3n de c\u00f3digo por medio de un nombre de funci\u00f3n no previsto despu\u00e9s de una subcadena {function name=" } ], "id": "CVE-2021-26120", "lastModified": "2024-11-21T05:55:54.330", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-22T02:15:14.323", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202105-06" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202105-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5151" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-10 20:15
Modified
2024-11-21 05:48
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0.3, template authors could run restricted static php methods. Users should upgrade to version 3.1.43 or 4.0.3 to receive a patch.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
smarty | smarty | * | |
smarty | smarty | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 | |
fedoraproject | fedora | 36 | |
fedoraproject | fedora | 37 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB541921-C8E7-479B-9CA1-9C3F136C412A", "versionEndExcluding": "3.1.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AB12C55-A7CF-495E-B2F8-761BF5912943", "versionEndExcluding": "4.0.3", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0.3, template authors could run restricted static php methods. Users should upgrade to version 3.1.43 or 4.0.3 to receive a patch." }, { "lang": "es", "value": "Smarty es un motor de plantillas para PHP que facilita la separaci\u00f3n de la presentaci\u00f3n (HTML/CSS) de la l\u00f3gica de la aplicaci\u00f3n. Antes de las versiones 3.1.43 y 4.0.3, los autores de plantillas pod\u00edan ejecutar m\u00e9todos est\u00e1ticos restringidos de php. Los usuarios deben actualizar a la versi\u00f3n 3.1.43 o 4.0.3 para recibir el parche" } ], "id": "CVE-2021-21408", "lastModified": "2024-11-21T05:48:17.783", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-10T20:15:07.913", "references": [ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.43" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.3" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/" }, { "source": "security-advisories@github.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5151" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-29 14:15
Modified
2024-11-21 08:21
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
4.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Summary
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin <= 3.1.35 versions.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "C4688979-8FCE-4AB2-A0E2-F8A76435BC67", "versionEndIncluding": "3.1.35", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin \u003c=\u00a03.1.35 versions." }, { "lang": "es", "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en PressPage Entertainment Inc. Smarty para el complemento WordPress en versiones \u0026lt;= 3.1.35." } ], "id": "CVE-2023-41661", "lastModified": "2024-11-21T08:21:26.417", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 3.7, "source": "audit@patchstack.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-29T14:15:10.500", "references": [ { "source": "audit@patchstack.com", "tags": [ "Third Party Advisory" ], "url": "https://patchstack.com/database/vulnerability/smarty-for-wordpress/wordpress-smarty-for-wordpress-plugin-3-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://patchstack.com/database/vulnerability/smarty-for-wordpress/wordpress-smarty-for-wordpress-plugin-3-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve" } ], "sourceIdentifier": "audit@patchstack.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "audit@patchstack.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-22 02:15
Modified
2024-11-21 05:55
Severity ?
Summary
Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
smarty | smarty | * | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
debian | debian_linux | 11.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC1FB377-4E78-4086-BCA1-0B6805311AA7", "versionEndExcluding": "3.1.39", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode." }, { "lang": "es", "value": "Smarty versiones anteriores a 3.1.39, permite un Escape del Sandbox porque un $smarty.template_object puede ser accedido en el modo sandbox" } ], "id": "CVE-2021-26119", "lastModified": "2024-11-21T05:55:54.163", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-22T02:15:14.260", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202105-06" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5151" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202105-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5151" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:56
Severity ?
Summary
Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code." } ], "id": "CVE-2005-0913", "lastModified": "2024-11-20T23:56:10.357", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://news.php.net/php.smarty.dev/2673" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/14729/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200503-35.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1013556" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/12941" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://news.php.net/php.smarty.dev/2673" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/14729/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200503-35.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1013556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/12941" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19880" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:11
Severity ?
Summary
Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:beta5:*:*:*:*:*:*", "matchCriteriaId": "742E17E7-7859-4D73-84C1-9BB236F06CD7", "versionEndIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file." }, { "lang": "es", "value": "Vulnerabilidad no especificada en Smarty anterior a v3.0.0 beta 6 permite a atacantes remotos ejecutar c\u00f3digo PHP arbitrario inyectando este c\u00f3digo dentro de un fichero cache." } ], "id": "CVE-2009-5053", "lastModified": "2024-11-21T01:11:04.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-03T17:00:01.773", "references": [ { "source": "cve@mitre.org", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:21
Severity ?
Summary
Smarty before 3.0.0 beta 7 does not properly handle the <?php and ?> tags, which has unspecified impact and remote attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:beta6:*:*:*:*:*:*", "matchCriteriaId": "E69E7105-4FE0-4723-925B-0F5D30B91FED", "versionEndIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty before 3.0.0 beta 7 does not properly handle the \u003c?php and ?\u003e tags, which has unspecified impact and remote attack vectors." }, { "lang": "es", "value": "Smarty anterior a v3.0.0 beta 7 no controla correctamente las etiquetas \u003c? php y?\u003e, teniendo un impacto no especificado y vectores de ataque remotos." } ], "id": "CVE-2010-4727", "lastModified": "2024-11-21T01:21:37.237", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-03T17:00:02.117", "references": [ { "source": "cve@mitre.org", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-15 00:15
Modified
2024-11-21 04:03
Severity ?
Summary
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C07B998-ABE8-4F99-8A25-EEEBBC27599E", "versionEndExcluding": "3.1.47", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4C5DBC8-BA50-48A6-965D-2BC0750735CE", "versionEndExcluding": "4.2.1", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user." }, { "lang": "es", "value": "En Smarty versiones anteriores a 3.1.47 y 4.x anteriores a 4.2.1, el archivo libs/plugins/function.mailto.php permite un ataque de tipo XSS. Una p\u00e1gina web que usa smarty_function_mailto, y que pueda ser parametrizada usando par\u00e1metros de entrada GET o POST, podr\u00eda permitir una inyecci\u00f3n de c\u00f3digo JavaScript por parte de un usuario" } ], "id": "CVE-2018-25047", "lastModified": "2024-11-21T04:03:26.110", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-15T00:15:09.580", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/870100" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/issues/454" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.47" }, { "source": "cve@mitre.org", "tags": [ "Release Notes" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.2.1" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/870100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/issues/454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://github.com/smarty-php/smarty/releases/tag/v4.2.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-09" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-10-31 18:09
Modified
2024-11-21 00:52
Severity ?
Summary
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka \"php executed in templates;\" and (2) a double quoted literal string, aka a \"function injection security hole.\" NOTE: each vector affects slightly different SVN revisions." }, { "lang": "es", "value": "La funci\u00f3n _expand_quoted_text en libs/Smarty_Compiler.class.php en Smarty 2.6.20 antes de r2797 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante vectores relacionados con plantillas y (1) un car\u00e1cter del signo del d\u00f3lar, tambi\u00e9n conocido como \"php ejecutado en plantillas\"; y (2) una cadena de un literal con dobles comillas, tambi\u00e9n conocido como \"agujero de seguridad en inyecci\u00f3n de funci\u00f3n\". NOTA: cada vector afecta de un modo ligeramente diferente a las revisiones SVN." } ], "id": "CVE-2008-4810", "lastModified": "2024-11-21T00:52:37.437", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-10-31T18:09:08.540", "references": [ { "source": "cve@mitre.org", "url": "http://code.google.com/p/smarty-php/source/detail?r=2784\u0026path=/trunk/libs/Smarty_Compiler.class.php" }, { "source": "cve@mitre.org", "url": "http://code.google.com/p/smarty-php/source/detail?r=2797\u0026path=/trunk/libs/Smarty_Compiler.class.php" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32329" }, { "source": "cve@mitre.org", "url": "http://securityvulns.ru/Udocument746.html" }, { "source": "cve@mitre.org", "url": "http://smarty-php.googlecode.com/svn/trunk/NEWS" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1691" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31862" }, { "source": "cve@mitre.org", "url": "https://bugs.gentoo.org/attachment.cgi?id=169804\u0026action=view" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.google.com/p/smarty-php/source/detail?r=2784\u0026path=/trunk/libs/Smarty_Compiler.class.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.google.com/p/smarty-php/source/detail?r=2797\u0026path=/trunk/libs/Smarty_Compiler.class.php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityvulns.ru/Udocument746.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://smarty-php.googlecode.com/svn/trunk/NEWS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.gentoo.org/attachment.cgi?id=169804\u0026action=view" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46031" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-10-31 18:09
Modified
2024-11-21 00:52
Severity ?
Summary
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "77A20DDC-B660-4707-9CF6-76998641F161", "versionEndIncluding": "2.6.20", "vulnerable": false }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \\ (backslash) before a dollar-sign character." }, { "lang": "es", "value": "La funci\u00f3n _expand_quoted_text en libs/Smarty_Compiler.class.php en Smarty 2.6.20 r2797 y anteriores permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante vectores relacionados con plantillas y una \\ (barra invertida) antes de un car\u00e1cter del signo del d\u00f3lar." } ], "id": "CVE-2008-4811", "lastModified": "2024-11-21T00:52:37.600", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-10-31T18:09:08.570", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32329" }, { "source": "cve@mitre.org", "url": "http://securityvulns.ru/Udocument746.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1691" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31862" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityvulns.ru/Udocument746.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1691" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46406" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:21
Severity ?
Summary
Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "6954746D-86EE-43C0-B30B-5E04609A68BC", "versionEndIncluding": "3.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F60BF56B-7165-456C-B7D1-AF6E869B7337", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "A46B316A-0D93-4B17-AFF7-C52FFFF361FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "3DC9CDED-796C-4081-83DD-7AE59700FF39", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors." }, { "lang": "es", "value": "Una vulnerabilidad no especificada en el plugin \u0027fetch\u0027 del motor de plantillas PHP Smarty v3.0.2 tiene un impacto desconocido y vectores de ataque a distancia." } ], "id": "CVE-2010-4722", "lastModified": "2024-11-21T01:21:36.540", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-03T17:00:01.900", "references": [ { "source": "cve@mitre.org", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-11-03 16:55
Modified
2024-11-21 02:18
Severity ?
Summary
Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "996AF6BF-920D-4A80-83C9-A367B7024537", "versionEndIncluding": "3.1.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F60BF56B-7165-456C-B7D1-AF6E869B7337", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "A46B316A-0D93-4B17-AFF7-C52FFFF361FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "3DC9CDED-796C-4081-83DD-7AE59700FF39", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0AA427E6-AE83-4227-B45B-BD84569ACA2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8C8DB2D9-9D3D-4F01-869F-AA5BEB2891DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9FE6E86E-623A-4136-9945-1E99629916B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "9A55A97A-FD19-4385-92D7-D511D53EE38C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "8F7BBD2A-45A1-4C98-9C73-DBBF2161BE29", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "0CB86C08-AE24-4B3C-90FE-917996A0A48C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "DADDE896-B711-4ECD-B560-E9665B178173", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "293032B8-72CB-4201-901E-3A70613B7518", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA2F1ACE-C3BD-4DEA-A317-38CD4928A781", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "469D55FF-5436-4000-8FF3-B3761761A429", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "34C390AB-D6A6-4ABF-AA1E-A9294AC2FD70", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "21D02454-647C-43B9-9DAC-A0306FB52F36", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "FF0159CD-A5A9-4C7A-9EDC-9A6BC8740847", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "AB73E7D4-A784-41EF-8DC8-3BF9245A549D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "0BD8A9C9-FFA8-46E8-874C-F5A31A785102", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "FE74F83B-33BB-4303-A022-51422BFBB8C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "D780E5BB-4DC5-4E7C-A1B5-FE6E9E75B5D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "0CE55049-426E-4B43-8A55-A643B423A921", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "88CDDA12-5690-442E-A893-47E9E2E60617", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D731309D-2418-4382-B565-E74C4593527F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "3C9A9770-5A48-45D8-A3E3-16867CED4B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "2F9C2F03-33E0-4A2B-B363-68DC3337AF22", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "5346D673-2803-4F22-A66F-3398D0999816", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "05ECDD17-2C52-4C74-99C5-7047C56B6DCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2E3A977F-9F73-401E-AD8E-A165F5BEE622", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "3718C076-3A47-46F6-A780-A4FF7FC03062", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "BC520821-A9AA-47BB-A771-DFF0692A77C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "C211F361-2A62-4D69-ADDA-657417657EFC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by \"{literal}\u003c{/literal}script language=php\u003e\" in a template." }, { "lang": "es", "value": "Smarty anterior a 3.1.21 permite a atacantes remotos evadir las restricciones del modo seguro y ejecutar c\u00f3digo PHP arbitrario tal y como fue demostrado por \u0027{literal}\u003c{/literal}script language=php\u003e\u0027 en una plantilla." } ], "id": "CVE-2014-8350", "lastModified": "2024-11-21T02:18:55.087", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-11-03T16:55:08.010", "references": [ { "source": "security@debian.org", "url": "http://advisories.mageia.org/MGASA-2014-0468.html" }, { "source": "security@debian.org", "tags": [ "Exploit" ], "url": "http://seclists.org/oss-sec/2014/q4/420" }, { "source": "security@debian.org", "tags": [ "Exploit" ], "url": "http://seclists.org/oss-sec/2014/q4/421" }, { "source": "security@debian.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/bid/70708" }, { "source": "security@debian.org", "tags": [ "Exploit" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920" }, { "source": "security@debian.org", "url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902" }, { "source": "security@debian.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://advisories.mageia.org/MGASA-2014-0468.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/oss-sec/2014/q4/420" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://seclists.org/oss-sec/2014/q4/421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/70708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:21
Severity ?
Summary
Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:rc2:*:*:*:*:*:*", "matchCriteriaId": "6207715A-D4B8-44DC-8E02-7454C82EB09F", "versionEndIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors." }, { "lang": "es", "value": "El motor de plantillas PHP Smarty antes de su versi\u00f3n v3.0.0 RC3 no controla correctamente el valor de la opci\u00f3n asp_tags del archivo php.ini, lo cual tiene un impacto no especificado y vectores de ataque a distancia." } ], "id": "CVE-2010-4725", "lastModified": "2024-11-21T01:21:36.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-03T17:00:02.023", "references": [ { "source": "cve@mitre.org", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:21
Severity ?
Summary
Multiple unspecified vulnerabilities in the parser implementation in Smarty before 3.0.0 RC3 have unknown impact and remote attack vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:rc2:*:*:*:*:*:*", "matchCriteriaId": "6207715A-D4B8-44DC-8E02-7454C82EB09F", "versionEndIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*", "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in the parser implementation in Smarty before 3.0.0 RC3 have unknown impact and remote attack vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en la implementaci\u00f3n del analizador de p\u00e1ginas web de Smarty en versiones anteriores a la v3.0.0 RC3 tienen un impacto desconocido y vectores de ataque a distancia." } ], "id": "CVE-2010-4724", "lastModified": "2024-11-21T01:21:36.827", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-03T17:00:01.977", "references": [ { "source": "cve@mitre.org", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:21
Severity ?
Summary
Unspecified vulnerability in the math plugin in Smarty before 3.0.0 RC1 has unknown impact and remote attack vectors. NOTE: this might overlap CVE-2009-1669.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:beta8:*:*:*:*:*:*", "matchCriteriaId": "1B595782-9432-44A0-92C6-5964330267F8", "versionEndIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*", "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*", "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*", "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*", "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*", "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*", "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*", "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*", "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*", "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*", "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*", "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C", "vulnerable": true }, { "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the math plugin in Smarty before 3.0.0 RC1 has unknown impact and remote attack vectors. NOTE: this might overlap CVE-2009-1669." }, { "lang": "es", "value": "Una vulnerabilidad no especificada en el plug-in \u0027math\u0027 de Smarty antes de v3.0.0 RC1 tiene un impacto desconocido y vectores de ataque remotos. NOTA: esto podr\u00eda superponerse al CVE-2009-1669." } ], "id": "CVE-2010-4726", "lastModified": "2024-11-21T01:21:37.100", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-03T17:00:02.070", "references": [ { "source": "cve@mitre.org", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-01-03 18:29
Modified
2024-11-21 03:04
Severity ?
Summary
Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*", "matchCriteriaId": "079D6950-7B16-4224-A87F-3858874D9FF6", "versionEndExcluding": "3.1.32", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name." }, { "lang": "es", "value": "Smarty 3, en versiones anteriores a la 3.1.32, es vulnerable a una inyecci\u00f3n de c\u00f3digo PHP al llamar a las funciones fetch() o display() en recursos personalizados que no sanean el nombre de la plantilla." } ], "id": "CVE-2017-1000480", "lastModified": "2024-11-21T03:04:49.670", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-03T18:29:00.370", "references": [ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/blob/master/change_log.txt" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html" }, { "source": "cve@mitre.org", "url": "https://www.debian.org/security/2018/dsa-4094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/smarty-php/smarty/blob/master/change_log.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.debian.org/security/2018/dsa-4094" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
jvndb-2012-000094
Vulnerability from jvndb
Published
2012-10-10 14:45
Modified
2012-10-10 14:45
Summary
Smarty vulnerable to cross-site scripting
Details
Smarty contains a cross-site scripting vulnerability.
Smarty is a template engine for PHP. Smarty contains a cross-site scripting vulnerability when displaying an error message.
Yuji Tounai of bogus.jp reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000094.html", "dc:date": "2012-10-10T14:45+09:00", "dcterms:issued": "2012-10-10T14:45+09:00", "dcterms:modified": "2012-10-10T14:45+09:00", "description": "Smarty contains a cross-site scripting vulnerability.\r\n\r\nSmarty is a template engine for PHP. Smarty contains a cross-site scripting vulnerability when displaying an error message.\r\n\r\nYuji Tounai of bogus.jp reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000094.html", "sec:cpe": { "#text": "cpe:/a:smarty:smarty", "@product": "Smarty", "@vendor": "Smarty", "@version": "2.2" }, "sec:cvss": { "@score": "4.3", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2012-000094", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN63650108/index.html", "@id": "JVN#63650108", "@source": "JVN" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4437", "@id": "CVE-2012-4437", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4437", "@id": "CVE-2012-4437", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-79", "@title": "Cross-site Scripting(CWE-79)" } ], "title": "Smarty vulnerable to cross-site scripting" }