Vulnerabilites related to smarty - smarty
cve-2008-1066
Vulnerability from cvelistv5
Published
2008-02-28 20:00
Modified
2024-08-07 08:08
Severity ?
Summary
The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
References
http://secunia.com/advisories/29398third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29241third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1520vendor-advisory, x_refsource_DEBIAN
http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-201111-04.xmlvendor-advisory, x_refsource_GENTOO
http://www.smarty.net/misc/NEWSx_refsource_CONFIRM
http://secunia.com/advisories/29405third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/29392third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/29839third-party-advisory, x_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.htmlvendor-advisory, x_refsource_SUSE
https://exchange.xforce.ibmcloud.com/vulnerabilities/41002vdb-entry, x_refsource_XF
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/bid/28105vdb-entry, x_refsource_BID
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.htmlvendor-advisory, x_refsource_FEDORA
http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.htmlx_refsource_CONFIRM
http://secunia.com/advisories/29562third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:08:57.497Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "29398",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29398"
          },
          {
            "name": "29241",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29241"
          },
          {
            "name": "DSA-1520",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1520"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652"
          },
          {
            "name": "GLSA-201111-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201111-04.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.smarty.net/misc/NEWS"
          },
          {
            "name": "29405",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29405"
          },
          {
            "name": "FEDORA-2008-2656",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html"
          },
          {
            "name": "29392",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29392"
          },
          {
            "name": "29839",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29839"
          },
          {
            "name": "SUSE-SR:2008:007",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html"
          },
          {
            "name": "smarty-modifierregexreplace-security-bypass(41002)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41002"
          },
          {
            "name": "FEDORA-2008-2587",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html"
          },
          {
            "name": "28105",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28105"
          },
          {
            "name": "FEDORA-2008-2650",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html"
          },
          {
            "name": "29562",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29562"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a \u0027\\0\u0027 character in a search string."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "29398",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29398"
        },
        {
          "name": "29241",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29241"
        },
        {
          "name": "DSA-1520",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1520"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652"
        },
        {
          "name": "GLSA-201111-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201111-04.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.smarty.net/misc/NEWS"
        },
        {
          "name": "29405",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29405"
        },
        {
          "name": "FEDORA-2008-2656",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html"
        },
        {
          "name": "29392",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29392"
        },
        {
          "name": "29839",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29839"
        },
        {
          "name": "SUSE-SR:2008:007",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html"
        },
        {
          "name": "smarty-modifierregexreplace-security-bypass(41002)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41002"
        },
        {
          "name": "FEDORA-2008-2587",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html"
        },
        {
          "name": "28105",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28105"
        },
        {
          "name": "FEDORA-2008-2650",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html"
        },
        {
          "name": "29562",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29562"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1066",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a \u0027\\0\u0027 character in a search string."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "29398",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29398"
            },
            {
              "name": "29241",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29241"
            },
            {
              "name": "DSA-1520",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1520"
            },
            {
              "name": "http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652",
              "refsource": "CONFIRM",
              "url": "http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652"
            },
            {
              "name": "GLSA-201111-04",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201111-04.xml"
            },
            {
              "name": "http://www.smarty.net/misc/NEWS",
              "refsource": "CONFIRM",
              "url": "http://www.smarty.net/misc/NEWS"
            },
            {
              "name": "29405",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29405"
            },
            {
              "name": "FEDORA-2008-2656",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html"
            },
            {
              "name": "29392",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29392"
            },
            {
              "name": "29839",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29839"
            },
            {
              "name": "SUSE-SR:2008:007",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html"
            },
            {
              "name": "smarty-modifierregexreplace-security-bypass(41002)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41002"
            },
            {
              "name": "FEDORA-2008-2587",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html"
            },
            {
              "name": "28105",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28105"
            },
            {
              "name": "FEDORA-2008-2650",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html"
            },
            {
              "name": "http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html",
              "refsource": "CONFIRM",
              "url": "http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html"
            },
            {
              "name": "29562",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29562"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1066",
    "datePublished": "2008-02-28T20:00:00",
    "dateReserved": "2008-02-28T00:00:00",
    "dateUpdated": "2024-08-07T08:08:57.497Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-7193
Vulnerability from cvelistv5
Published
2007-04-12 19:00
Modified
2024-08-07 20:57
Severity ?
Summary
PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter. NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant
References
http://marc.info/?l=bugtraq&m=116163668213491&w=2mailing-list, x_refsource_BUGTRAQ
http://osvdb.org/31096vdb-entry, x_refsource_OSVDB
http://marc.info/?l=bugtraq&m=116170769322920&w=2mailing-list, x_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilities/29739vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:57:41.177Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20061023 Smarty-2.6.1 Remote File Include Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=116163668213491\u0026w=2"
          },
          {
            "name": "31096",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/31096"
          },
          {
            "name": "20061024 Re: Smarty-2.6.1 Remote File Include Vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=116170769322920\u0026w=2"
          },
          {
            "name": "smarty-test-file-include(29739)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29739"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter.  NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20061023 Smarty-2.6.1 Remote File Include Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=116163668213491\u0026w=2"
        },
        {
          "name": "31096",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/31096"
        },
        {
          "name": "20061024 Re: Smarty-2.6.1 Remote File Include Vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=116170769322920\u0026w=2"
        },
        {
          "name": "smarty-test-file-include(29739)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29739"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-7193",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED **  PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter.  NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20061023 Smarty-2.6.1 Remote File Include Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=116163668213491\u0026w=2"
            },
            {
              "name": "31096",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/31096"
            },
            {
              "name": "20061024 Re: Smarty-2.6.1 Remote File Include Vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=116170769322920\u0026w=2"
            },
            {
              "name": "smarty-test-file-include(29739)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29739"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-7193",
    "datePublished": "2007-04-12T19:00:00",
    "dateReserved": "2007-04-12T00:00:00",
    "dateUpdated": "2024-08-07T20:57:41.177Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-13982
Vulnerability from cvelistv5
Published
2018-09-18 21:00
Modified
2024-08-05 09:21
Severity ?
Summary
Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T09:21:40.766Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal"
          },
          {
            "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
          },
          {
            "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
          },
          {
            "name": "[debian-lts-announce] 20211020 [SECURITY] [DLA 2618-3] smarty3 regression update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-09-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-20T13:06:07",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal"
        },
        {
          "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
        },
        {
          "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
        },
        {
          "name": "[debian-lts-announce] 20211020 [SECURITY] [DLA 2618-3] smarty3 regression update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-13982",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50",
              "refsource": "CONFIRM",
              "url": "https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50"
            },
            {
              "name": "https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8",
              "refsource": "CONFIRM",
              "url": "https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8"
            },
            {
              "name": "https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1",
              "refsource": "CONFIRM",
              "url": "https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1"
            },
            {
              "name": "https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe",
              "refsource": "CONFIRM",
              "url": "https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe"
            },
            {
              "name": "https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531",
              "refsource": "CONFIRM",
              "url": "https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531"
            },
            {
              "name": "https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal",
              "refsource": "MISC",
              "url": "https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal"
            },
            {
              "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
            },
            {
              "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
            },
            {
              "name": "[debian-lts-announce] 20211020 [SECURITY] [DLA 2618-3] smarty3 regression update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-13982",
    "datePublished": "2018-09-18T21:00:00",
    "dateReserved": "2018-07-11T00:00:00",
    "dateUpdated": "2024-08-05T09:21:40.766Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-4437
Vulnerability from cvelistv5
Published
2012-10-01 01:00
Modified
2024-08-06 20:35
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:35:09.815Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20120919 CVE Request Smarty / php-Smarty: XSS in Smarty exception messages",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/19/1"
          },
          {
            "name": "FEDORA-2012-14578",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://advisories.mageia.org/MGASA-2014-0468.html"
          },
          {
            "name": "50589",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50589"
          },
          {
            "name": "MDVSA-2014:221",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221"
          },
          {
            "name": "JVNDB-2012-000094",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html"
          },
          {
            "name": "JVN#63650108",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN63650108/index.html"
          },
          {
            "name": "[oss-security] 20120919 Re: CVE Request Smarty / php-Smarty: XSS in Smarty exception messages",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/09/20/3"
          },
          {
            "name": "55506",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/55506"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/smarty-php/source/detail?r=4658"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-09-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-03-19T15:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20120919 CVE Request Smarty / php-Smarty: XSS in Smarty exception messages",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/19/1"
        },
        {
          "name": "FEDORA-2012-14578",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://advisories.mageia.org/MGASA-2014-0468.html"
        },
        {
          "name": "50589",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50589"
        },
        {
          "name": "MDVSA-2014:221",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221"
        },
        {
          "name": "JVNDB-2012-000094",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html"
        },
        {
          "name": "JVN#63650108",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN63650108/index.html"
        },
        {
          "name": "[oss-security] 20120919 Re: CVE Request Smarty / php-Smarty: XSS in Smarty exception messages",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/09/20/3"
        },
        {
          "name": "55506",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/55506"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/smarty-php/source/detail?r=4658"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-4437",
    "datePublished": "2012-10-01T01:00:00",
    "dateReserved": "2012-08-21T00:00:00",
    "dateUpdated": "2024-08-06T20:35:09.815Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-25047
Vulnerability from cvelistv5
Published
2022-09-14 00:00
Modified
2024-08-05 12:26
Severity ?
Summary
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T12:26:39.663Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/issues/454"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/releases/tag/v4.2.1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.47"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugs.gentoo.org/870100"
          },
          {
            "name": "GLSA-202209-09",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202209-09"
          },
          {
            "name": "[debian-lts-announce] 20230105 [SECURITY] [DLA 3262-1] smarty3 security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-05T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/smarty-php/smarty/issues/454"
        },
        {
          "url": "https://github.com/smarty-php/smarty/releases/tag/v4.2.1"
        },
        {
          "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.47"
        },
        {
          "url": "https://bugs.gentoo.org/870100"
        },
        {
          "name": "GLSA-202209-09",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202209-09"
        },
        {
          "name": "[debian-lts-announce] 20230105 [SECURITY] [DLA 3262-1] smarty3 security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-25047",
    "datePublished": "2022-09-14T00:00:00",
    "dateReserved": "2022-09-14T00:00:00",
    "dateUpdated": "2024-08-05T12:26:39.663Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-21408
Vulnerability from cvelistv5
Published
2022-01-10 00:00
Modified
2024-08-03 18:09
Summary
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0.3, template authors could run restricted static php methods. Users should upgrade to version 3.1.43 or 4.0.3 to receive a patch.
Impacted products
Vendor Product Version
smarty-php smarty Version: < 3.1.43
Version: >= 4.0.0, < 4.0.3
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T18:09:16.192Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.43"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.3"
          },
          {
            "name": "[debian-lts-announce] 20220505 [SECURITY] [DLA 2995-1] smarty3 security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html"
          },
          {
            "name": "DSA-5151",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2022/dsa-5151"
          },
          {
            "name": "GLSA-202209-09",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202209-09"
          },
          {
            "name": "FEDORA-2022-52154efd61",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/"
          },
          {
            "name": "FEDORA-2022-d5fc9dcdd7",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "smarty",
          "vendor": "smarty-php",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 3.1.43"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.0.0, \u003c 4.0.3"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0.3, template authors could run restricted static php methods. Users should upgrade to version 3.1.43 or 4.0.3 to receive a patch."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20: Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-14T00:00:00",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m"
        },
        {
          "url": "https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664"
        },
        {
          "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.43"
        },
        {
          "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.3"
        },
        {
          "name": "[debian-lts-announce] 20220505 [SECURITY] [DLA 2995-1] smarty3 security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html"
        },
        {
          "name": "DSA-5151",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.debian.org/security/2022/dsa-5151"
        },
        {
          "name": "GLSA-202209-09",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202209-09"
        },
        {
          "name": "FEDORA-2022-52154efd61",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/"
        },
        {
          "name": "FEDORA-2022-d5fc9dcdd7",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/"
        }
      ],
      "source": {
        "advisory": "GHSA-4h9c-v5vg-5m6m",
        "discovery": "UNKNOWN"
      },
      "title": "Access to restricted PHP code by dynamic static class access in smarty"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2021-21408",
    "datePublished": "2022-01-10T00:00:00",
    "dateReserved": "2020-12-22T00:00:00",
    "dateUpdated": "2024-08-03T18:09:16.192Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-4811
Vulnerability from cvelistv5
Published
2008-10-31 17:18
Modified
2024-08-07 10:31
Severity ?
Summary
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.
References
http://secunia.com/advisories/32329third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/46406vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/31862vdb-entry, x_refsource_BID
http://www.debian.org/security/2008/dsa-1691vendor-advisory, x_refsource_DEBIAN
http://securityvulns.ru/Udocument746.htmlx_refsource_MISC
http://www.openwall.com/lists/oss-security/2008/10/25/2mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:31:27.587Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "32329",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32329"
          },
          {
            "name": "smarty-expandquotedtext-code-execution1(46406)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46406"
          },
          {
            "name": "31862",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31862"
          },
          {
            "name": "DSA-1691",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1691"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://securityvulns.ru/Udocument746.html"
          },
          {
            "name": "[oss-security] 20081025 Regarding SA32329 (Smarty \"_expand_quoted_text()\" Security Bypass)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \\ (backslash) before a dollar-sign character."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "32329",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32329"
        },
        {
          "name": "smarty-expandquotedtext-code-execution1(46406)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46406"
        },
        {
          "name": "31862",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31862"
        },
        {
          "name": "DSA-1691",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1691"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://securityvulns.ru/Udocument746.html"
        },
        {
          "name": "[oss-security] 20081025 Regarding SA32329 (Smarty \"_expand_quoted_text()\" Security Bypass)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4811",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \\ (backslash) before a dollar-sign character."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "32329",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32329"
            },
            {
              "name": "smarty-expandquotedtext-code-execution1(46406)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46406"
            },
            {
              "name": "31862",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31862"
            },
            {
              "name": "DSA-1691",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1691"
            },
            {
              "name": "http://securityvulns.ru/Udocument746.html",
              "refsource": "MISC",
              "url": "http://securityvulns.ru/Udocument746.html"
            },
            {
              "name": "[oss-security] 20081025 Regarding SA32329 (Smarty \"_expand_quoted_text()\" Security Bypass)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4811",
    "datePublished": "2008-10-31T17:18:00",
    "dateReserved": "2008-10-31T00:00:00",
    "dateUpdated": "2024-08-07T10:31:27.587Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2005-0913
Vulnerability from cvelistv5
Published
2005-03-29 05:00
Modified
2024-08-07 21:28
Severity ?
Summary
Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code.
References
http://secunia.com/advisories/14729/third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/12941vdb-entry, x_refsource_BID
http://news.php.net/php.smarty.dev/2673x_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-200503-35.xmlvendor-advisory, x_refsource_GENTOO
https://exchange.xforce.ibmcloud.com/vulnerabilities/19880vdb-entry, x_refsource_XF
http://securitytracker.com/id?1013556vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:28:28.507Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "14729",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/14729/"
          },
          {
            "name": "12941",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12941"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://news.php.net/php.smarty.dev/2673"
          },
          {
            "name": "GLSA-200503-35",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200503-35.xml"
          },
          {
            "name": "smarty-regexreplace-security-bpass(19880)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19880"
          },
          {
            "name": "1013556",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1013556"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-03-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "14729",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/14729/"
        },
        {
          "name": "12941",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12941"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://news.php.net/php.smarty.dev/2673"
        },
        {
          "name": "GLSA-200503-35",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200503-35.xml"
        },
        {
          "name": "smarty-regexreplace-security-bpass(19880)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19880"
        },
        {
          "name": "1013556",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1013556"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0913",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "14729",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/14729/"
            },
            {
              "name": "12941",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12941"
            },
            {
              "name": "http://news.php.net/php.smarty.dev/2673",
              "refsource": "CONFIRM",
              "url": "http://news.php.net/php.smarty.dev/2673"
            },
            {
              "name": "GLSA-200503-35",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200503-35.xml"
            },
            {
              "name": "smarty-regexreplace-security-bpass(19880)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19880"
            },
            {
              "name": "1013556",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1013556"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0913",
    "datePublished": "2005-03-29T05:00:00",
    "dateReserved": "2005-03-29T00:00:00",
    "dateUpdated": "2024-08-07T21:28:28.507Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-8350
Vulnerability from cvelistv5
Published
2014-11-03 16:00
Modified
2024-08-06 13:18
Severity ?
Summary
Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:18:48.203Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "70708",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/70708"
          },
          {
            "name": "[oss-security] 20141023 Re: CVE Request: smarty: secure mode bypass",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2014/q4/421"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://advisories.mageia.org/MGASA-2014-0468.html"
          },
          {
            "name": "[oss-security] 20141022 CVE Request: smarty: secure mode bypass",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2014/q4/420"
          },
          {
            "name": "MDVSA-2014:221",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221"
          },
          {
            "name": "smarty-cve20148350-code-exec(97725)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-10-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by \"{literal}\u003c{/literal}script language=php\u003e\" in a template."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-07T15:57:01",
        "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
        "shortName": "debian"
      },
      "references": [
        {
          "name": "70708",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/70708"
        },
        {
          "name": "[oss-security] 20141023 Re: CVE Request: smarty: secure mode bypass",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2014/q4/421"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://advisories.mageia.org/MGASA-2014-0468.html"
        },
        {
          "name": "[oss-security] 20141022 CVE Request: smarty: secure mode bypass",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2014/q4/420"
        },
        {
          "name": "MDVSA-2014:221",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221"
        },
        {
          "name": "smarty-cve20148350-code-exec(97725)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@debian.org",
          "ID": "CVE-2014-8350",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by \"{literal}\u003c{/literal}script language=php\u003e\" in a template."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "70708",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/70708"
            },
            {
              "name": "[oss-security] 20141023 Re: CVE Request: smarty: secure mode bypass",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2014/q4/421"
            },
            {
              "name": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902",
              "refsource": "CONFIRM",
              "url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902"
            },
            {
              "name": "http://advisories.mageia.org/MGASA-2014-0468.html",
              "refsource": "CONFIRM",
              "url": "http://advisories.mageia.org/MGASA-2014-0468.html"
            },
            {
              "name": "[oss-security] 20141022 CVE Request: smarty: secure mode bypass",
              "refsource": "MLIST",
              "url": "http://seclists.org/oss-sec/2014/q4/420"
            },
            {
              "name": "MDVSA-2014:221",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221"
            },
            {
              "name": "smarty-cve20148350-code-exec(97725)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725"
            },
            {
              "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920",
              "refsource": "CONFIRM",
              "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
    "assignerShortName": "debian",
    "cveId": "CVE-2014-8350",
    "datePublished": "2014-11-03T16:00:00",
    "dateReserved": "2014-10-20T00:00:00",
    "dateUpdated": "2024-08-06T13:18:48.203Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-16831
Vulnerability from cvelistv5
Published
2018-09-11 13:00
Modified
2024-08-05 10:32
Severity ?
Summary
Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T10:32:54.003Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/issues/486"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-09-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-09-11T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/smarty-php/smarty/issues/486"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-16831",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/smarty-php/smarty/issues/486",
              "refsource": "MISC",
              "url": "https://github.com/smarty-php/smarty/issues/486"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-16831",
    "datePublished": "2018-09-11T13:00:00",
    "dateReserved": "2018-09-11T00:00:00",
    "dateUpdated": "2024-08-05T10:32:54.003Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-5052
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-16 22:15
Severity ?
Summary
Multiple unspecified vulnerabilities in Smarty before 3.0.0 beta 6 have unknown impact and attack vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:53.997Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in Smarty before 3.0.0 beta 6 have unknown impact and attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-02-03T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5052",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in Smarty before 3.0.0 beta 6 have unknown impact and attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt",
              "refsource": "CONFIRM",
              "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5052",
    "datePublished": "2011-02-03T16:00:00Z",
    "dateReserved": "2011-02-03T00:00:00Z",
    "dateUpdated": "2024-09-16T22:15:52.756Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-4726
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-17 04:00
Severity ?
Summary
Unspecified vulnerability in the math plugin in Smarty before 3.0.0 RC1 has unknown impact and remote attack vectors. NOTE: this might overlap CVE-2009-1669.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:55:34.889Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the math plugin in Smarty before 3.0.0 RC1 has unknown impact and remote attack vectors.  NOTE: this might overlap CVE-2009-1669."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-02-03T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4726",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the math plugin in Smarty before 3.0.0 RC1 has unknown impact and remote attack vectors.  NOTE: this might overlap CVE-2009-1669."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt",
              "refsource": "CONFIRM",
              "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4726",
    "datePublished": "2011-02-03T16:00:00Z",
    "dateReserved": "2011-02-03T00:00:00Z",
    "dateUpdated": "2024-09-17T04:00:03.581Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-28447
Vulnerability from cvelistv5
Published
2023-03-28 20:07
Modified
2025-02-13 16:48
Summary
Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability.
Impacted products
Vendor Product Version
smarty-php smarty Version: >= 4.0.0, < 4.3.1
Version: < 3.1.48
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T12:38:25.300Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj"
          },
          {
            "name": "https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSAUM3YHWHO4UCJXRGRLQGPJAO3MFOZZ/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBB35GLYTL6JL6EOM6BOZNYP47JKNNHT/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7O7SKTATM6GAP45S64QFXNLWIY5I7HP/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "smarty",
          "vendor": "smarty-php",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 4.0.0, \u003c 4.3.1"
            },
            {
              "status": "affected",
              "version": "\u003c 3.1.48"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user\u0027s browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application\u0027s behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-15T03:06:39.782Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj"
        },
        {
          "name": "https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSAUM3YHWHO4UCJXRGRLQGPJAO3MFOZZ/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBB35GLYTL6JL6EOM6BOZNYP47JKNNHT/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7O7SKTATM6GAP45S64QFXNLWIY5I7HP/"
        }
      ],
      "source": {
        "advisory": "GHSA-7j98-h7fp-4vwj",
        "discovery": "UNKNOWN"
      },
      "title": "Cross site scripting vulnerability in Javascript escaping in smarty/smarty"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2023-28447",
    "datePublished": "2023-03-28T20:07:39.103Z",
    "dateReserved": "2023-03-15T15:59:10.057Z",
    "dateUpdated": "2025-02-13T16:48:42.664Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-4723
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-16 20:47
Severity ?
Summary
Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:55:35.129Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-02-03T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4723",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt",
              "refsource": "CONFIRM",
              "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4723",
    "datePublished": "2011-02-03T16:00:00Z",
    "dateReserved": "2011-02-03T00:00:00Z",
    "dateUpdated": "2024-09-16T20:47:30.850Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26119
Vulnerability from cvelistv5
Published
2021-02-22 01:34
Modified
2024-08-03 20:19
Severity ?
Summary
Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.153Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md"
          },
          {
            "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
          },
          {
            "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
          },
          {
            "name": "GLSA-202105-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202105-06"
          },
          {
            "name": "DSA-5151",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2022/dsa-5151"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-30T10:06:12",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md"
        },
        {
          "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
        },
        {
          "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
        },
        {
          "name": "GLSA-202105-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202105-06"
        },
        {
          "name": "DSA-5151",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2022/dsa-5151"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-26119",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md",
              "refsource": "MISC",
              "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md"
            },
            {
              "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
            },
            {
              "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
            },
            {
              "name": "GLSA-202105-06",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202105-06"
            },
            {
              "name": "DSA-5151",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2022/dsa-5151"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-26119",
    "datePublished": "2021-02-22T01:34:05",
    "dateReserved": "2021-01-25T00:00:00",
    "dateUpdated": "2024-08-03T20:19:20.153Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-4724
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-17 02:11
Severity ?
Summary
Multiple unspecified vulnerabilities in the parser implementation in Smarty before 3.0.0 RC3 have unknown impact and remote attack vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:55:35.110Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in the parser implementation in Smarty before 3.0.0 RC3 have unknown impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-02-03T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4724",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in the parser implementation in Smarty before 3.0.0 RC3 have unknown impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt",
              "refsource": "CONFIRM",
              "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4724",
    "datePublished": "2011-02-03T16:00:00Z",
    "dateReserved": "2011-02-03T00:00:00Z",
    "dateUpdated": "2024-09-17T02:11:11.239Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-29454
Vulnerability from cvelistv5
Published
2022-01-10 00:00
Modified
2024-08-03 22:02
Summary
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.
Impacted products
Vendor Product Version
smarty-php smarty Version: < 3.1.42
Version: >= 4.0.0, < 4.0.2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:02:51.996Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.42"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.2"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://packagist.org/packages/smarty/smarty"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.smarty.net/docs/en/language.function.math.tpl"
          },
          {
            "name": "[debian-lts-announce] 20220505 [SECURITY] [DLA 2995-1] smarty3 security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html"
          },
          {
            "name": "DSA-5151",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2022/dsa-5151"
          },
          {
            "name": "GLSA-202209-09",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202209-09"
          },
          {
            "name": "FEDORA-2022-52154efd61",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/"
          },
          {
            "name": "FEDORA-2022-d5fc9dcdd7",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "smarty",
          "vendor": "smarty-php",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 3.1.42"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.0.0, \u003c 4.0.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-74",
              "description": "CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-14T00:00:00",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m"
        },
        {
          "url": "https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71"
        },
        {
          "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.42"
        },
        {
          "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.2"
        },
        {
          "url": "https://packagist.org/packages/smarty/smarty"
        },
        {
          "url": "https://www.smarty.net/docs/en/language.function.math.tpl"
        },
        {
          "name": "[debian-lts-announce] 20220505 [SECURITY] [DLA 2995-1] smarty3 security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html"
        },
        {
          "name": "DSA-5151",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.debian.org/security/2022/dsa-5151"
        },
        {
          "name": "GLSA-202209-09",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202209-09"
        },
        {
          "name": "FEDORA-2022-52154efd61",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/"
        },
        {
          "name": "FEDORA-2022-d5fc9dcdd7",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/"
        }
      ],
      "source": {
        "advisory": "GHSA-29gp-2c3m-3j6m",
        "discovery": "UNKNOWN"
      },
      "title": "Sandbox Escape by math function in smarty"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2021-29454",
    "datePublished": "2022-01-10T00:00:00",
    "dateReserved": "2021-03-30T00:00:00",
    "dateUpdated": "2024-08-03T22:02:51.996Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-29221
Vulnerability from cvelistv5
Published
2022-05-24 00:00
Modified
2024-08-03 06:17
Summary
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.
Impacted products
Vendor Product Version
smarty-php smarty Version: < 3.1.45
Version: >= 4.0.0, < 4.1.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T06:17:54.199Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-634x-pc3q-cf4c"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/commit/64ad6442ca1da31cefdab5c9874262b702cccddd"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.45"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/releases/tag/v4.1.1"
          },
          {
            "name": "[debian-lts-announce] 20220529 [SECURITY] [DLA 3033-1] smarty3 security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00044.html"
          },
          {
            "name": "DSA-5151",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2022/dsa-5151"
          },
          {
            "name": "GLSA-202209-09",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202209-09"
          },
          {
            "name": "FEDORA-2022-52154efd61",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/"
          },
          {
            "name": "FEDORA-2022-d5fc9dcdd7",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "smarty",
          "vendor": "smarty-php",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 3.1.45"
            },
            {
              "status": "affected",
              "version": "\u003e= 4.0.0, \u003c 4.1.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "CWE-94: Improper Control of Generation of Code (\u0027Code Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-14T00:00:00",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-634x-pc3q-cf4c"
        },
        {
          "url": "https://github.com/smarty-php/smarty/commit/64ad6442ca1da31cefdab5c9874262b702cccddd"
        },
        {
          "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.45"
        },
        {
          "url": "https://github.com/smarty-php/smarty/releases/tag/v4.1.1"
        },
        {
          "name": "[debian-lts-announce] 20220529 [SECURITY] [DLA 3033-1] smarty3 security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00044.html"
        },
        {
          "name": "DSA-5151",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.debian.org/security/2022/dsa-5151"
        },
        {
          "name": "GLSA-202209-09",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://security.gentoo.org/glsa/202209-09"
        },
        {
          "name": "FEDORA-2022-52154efd61",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/"
        },
        {
          "name": "FEDORA-2022-d5fc9dcdd7",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/"
        }
      ],
      "source": {
        "advisory": "GHSA-634x-pc3q-cf4c",
        "discovery": "UNKNOWN"
      },
      "title": "PHP Code Injection by malicious block or filename in Smarty"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2022-29221",
    "datePublished": "2022-05-24T00:00:00",
    "dateReserved": "2022-04-13T00:00:00",
    "dateUpdated": "2024-08-03T06:17:54.199Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-41661
Vulnerability from cvelistv5
Published
2023-09-29 13:36
Modified
2024-08-02 19:01
Summary
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin <= 3.1.35 versions.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:01:35.433Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vdb-entry",
              "x_transferred"
            ],
            "url": "https://patchstack.com/database/vulnerability/smarty-for-wordpress/wordpress-smarty-for-wordpress-plugin-3-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://wordpress.org/plugins",
          "defaultStatus": "unaffected",
          "packageName": "smarty-for-wordpress",
          "product": "Smarty for WordPress",
          "vendor": "PressPage Entertainment Inc.",
          "versions": [
            {
              "lessThanOrEqual": "3.1.35",
              "status": "affected",
              "version": "n/a",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Prasanna V Balaji (Patchstack Alliance)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin \u0026lt;=\u003cspan style=\"background-color: var(--wht);\"\u003e\u0026nbsp;3.1.35 versions.\u003c/span\u003e"
            }
          ],
          "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin \u003c=\u00a03.1.35 versions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-09-29T13:36:29.118Z",
        "orgId": "21595511-bba5-4825-b968-b78d1f9984a3",
        "shortName": "Patchstack"
      },
      "references": [
        {
          "tags": [
            "vdb-entry"
          ],
          "url": "https://patchstack.com/database/vulnerability/smarty-for-wordpress/wordpress-smarty-for-wordpress-plugin-3-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "WordPress Smarty for WordPress Plugin \u003c= 3.1.35 is vulnerable to Cross Site Scripting (XSS)",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3",
    "assignerShortName": "Patchstack",
    "cveId": "CVE-2023-41661",
    "datePublished": "2023-09-29T13:36:29.118Z",
    "dateReserved": "2023-08-30T13:02:41.615Z",
    "dateUpdated": "2024-08-02T19:01:35.433Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-26120
Vulnerability from cvelistv5
Published
2021-02-22 01:38
Modified
2024-08-03 20:19
Severity ?
Summary
Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.027Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md"
          },
          {
            "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
          },
          {
            "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
          },
          {
            "name": "GLSA-202105-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202105-06"
          },
          {
            "name": "DSA-5151",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2022/dsa-5151"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-30T10:06:08",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md"
        },
        {
          "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
        },
        {
          "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
        },
        {
          "name": "GLSA-202105-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202105-06"
        },
        {
          "name": "DSA-5151",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2022/dsa-5151"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-26120",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md",
              "refsource": "MISC",
              "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md"
            },
            {
              "name": "[debian-lts-announce] 20210405 [SECURITY] [DLA 2618-1] smarty3 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
            },
            {
              "name": "[debian-lts-announce] 20210416 [SECURITY] [DLA 2618-2] smarty3 regression update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
            },
            {
              "name": "GLSA-202105-06",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202105-06"
            },
            {
              "name": "DSA-5151",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2022/dsa-5151"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-26120",
    "datePublished": "2021-02-22T01:38:15",
    "dateReserved": "2021-01-25T00:00:00",
    "dateUpdated": "2024-08-03T20:19:20.027Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-5054
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-17 01:35
Severity ?
Summary
Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:54.055Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-02-03T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5054",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt",
              "refsource": "CONFIRM",
              "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5054",
    "datePublished": "2011-02-03T16:00:00Z",
    "dateReserved": "2011-02-03T00:00:00Z",
    "dateUpdated": "2024-09-17T01:35:52.992Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-1000480
Vulnerability from cvelistv5
Published
2018-01-03 18:00
Modified
2024-08-05 22:00
Severity ?
Summary
Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:00:41.503Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-4094",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2018/dsa-4094"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/smarty-php/smarty/blob/master/change_log.txt"
          },
          {
            "name": "[debian-lts-announce] 20180119 [SECURITY] [DLA 1249-1] smarty3 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html"
          },
          {
            "name": "[debian-lts-announce] 20180201 [SECURITY] [DLA 1249-2] smarty3 regression update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "dateAssigned": "2017-12-29T00:00:00",
      "datePublic": "2018-01-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-02T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-4094",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2018/dsa-4094"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/smarty-php/smarty/blob/master/change_log.txt"
        },
        {
          "name": "[debian-lts-announce] 20180119 [SECURITY] [DLA 1249-1] smarty3 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html"
        },
        {
          "name": "[debian-lts-announce] 20180201 [SECURITY] [DLA 1249-2] smarty3 regression update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "DATE_ASSIGNED": "2017-12-29",
          "ID": "CVE-2017-1000480",
          "REQUESTER": "daniel@scrt.ch",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-4094",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2018/dsa-4094"
            },
            {
              "name": "https://github.com/smarty-php/smarty/blob/master/change_log.txt",
              "refsource": "MISC",
              "url": "https://github.com/smarty-php/smarty/blob/master/change_log.txt"
            },
            {
              "name": "[debian-lts-announce] 20180119 [SECURITY] [DLA 1249-1] smarty3 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html"
            },
            {
              "name": "[debian-lts-announce] 20180201 [SECURITY] [DLA 1249-2] smarty3 regression update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-1000480",
    "datePublished": "2018-01-03T18:00:00",
    "dateReserved": "2018-01-03T00:00:00",
    "dateUpdated": "2024-08-05T22:00:41.503Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-1669
Vulnerability from cvelistv5
Published
2009-05-18 18:00
Modified
2024-08-07 05:20
Severity ?
Summary
The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/50457vdb-entry, x_refsource_XF
http://secunia.com/advisories/35072third-party-advisory, x_refsource_SECUNIA
http://www.ubuntu.com/usn/usn-791-3vendor-advisory, x_refsource_UBUNTU
http://osvdb.org/54380vdb-entry, x_refsource_OSVDB
https://www.exploit-db.com/exploits/8659exploit, x_refsource_EXPLOIT-DB
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.htmlvendor-advisory, x_refsource_FEDORA
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.htmlvendor-advisory, x_refsource_FEDORA
http://secunia.com/advisories/35219third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.htmlvendor-advisory, x_refsource_FEDORA
http://www.securityfocus.com/bid/34918vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:20:35.190Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "smarty-smartyfunctionmath-cmd-execution(50457)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50457"
          },
          {
            "name": "35072",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35072"
          },
          {
            "name": "USN-791-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-791-3"
          },
          {
            "name": "54380",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/54380"
          },
          {
            "name": "8659",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/8659"
          },
          {
            "name": "FEDORA-2009-5520",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html"
          },
          {
            "name": "FEDORA-2009-5516",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html"
          },
          {
            "name": "35219",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35219"
          },
          {
            "name": "FEDORA-2009-5525",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html"
          },
          {
            "name": "34918",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34918"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-05-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "smarty-smartyfunctionmath-cmd-execution(50457)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50457"
        },
        {
          "name": "35072",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35072"
        },
        {
          "name": "USN-791-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-791-3"
        },
        {
          "name": "54380",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/54380"
        },
        {
          "name": "8659",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/8659"
        },
        {
          "name": "FEDORA-2009-5520",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html"
        },
        {
          "name": "FEDORA-2009-5516",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html"
        },
        {
          "name": "35219",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35219"
        },
        {
          "name": "FEDORA-2009-5525",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html"
        },
        {
          "name": "34918",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34918"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1669",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "smarty-smartyfunctionmath-cmd-execution(50457)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50457"
            },
            {
              "name": "35072",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35072"
            },
            {
              "name": "USN-791-3",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-791-3"
            },
            {
              "name": "54380",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/54380"
            },
            {
              "name": "8659",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/8659"
            },
            {
              "name": "FEDORA-2009-5520",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html"
            },
            {
              "name": "FEDORA-2009-5516",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html"
            },
            {
              "name": "35219",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35219"
            },
            {
              "name": "FEDORA-2009-5525",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html"
            },
            {
              "name": "34918",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34918"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1669",
    "datePublished": "2009-05-18T18:00:00",
    "dateReserved": "2009-05-18T00:00:00",
    "dateUpdated": "2024-08-07T05:20:35.190Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-4722
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-16 20:52
Severity ?
Summary
Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:55:35.249Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-02-03T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4722",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt",
              "refsource": "CONFIRM",
              "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4722",
    "datePublished": "2011-02-03T16:00:00Z",
    "dateReserved": "2011-02-03T00:00:00Z",
    "dateUpdated": "2024-09-16T20:52:41.489Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-4725
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-16 22:10
Severity ?
Summary
Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:55:34.922Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-02-03T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4725",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt",
              "refsource": "CONFIRM",
              "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4725",
    "datePublished": "2011-02-03T16:00:00Z",
    "dateReserved": "2011-02-03T00:00:00Z",
    "dateUpdated": "2024-09-16T22:10:28.503Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-5053
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-17 00:45
Severity ?
Summary
Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:54.093Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-02-03T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5053",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt",
              "refsource": "CONFIRM",
              "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5053",
    "datePublished": "2011-02-03T16:00:00Z",
    "dateReserved": "2011-02-03T00:00:00Z",
    "dateUpdated": "2024-09-17T00:45:39.163Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-4277
Vulnerability from cvelistv5
Published
2012-08-13 22:00
Modified
2024-09-17 01:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the smarty_function_html_options_optoutput function in distribution/libs/plugins/function.html_options.php in Smarty before 3.1.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:28:07.808Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1027061",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1027061"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/smarty-php/issues/detail?id=98\u0026can=1"
          },
          {
            "name": "49164",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49164"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/smarty-php/source/detail?r=4612"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the smarty_function_html_options_optoutput function in distribution/libs/plugins/function.html_options.php in Smarty before 3.1.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-08-13T22:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1027061",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1027061"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://code.google.com/p/smarty-php/issues/detail?id=98\u0026can=1"
        },
        {
          "name": "49164",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49164"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/smarty-php/source/detail?r=4612"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-4277",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the smarty_function_html_options_optoutput function in distribution/libs/plugins/function.html_options.php in Smarty before 3.1.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1027061",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1027061"
            },
            {
              "name": "http://code.google.com/p/smarty-php/issues/detail?id=98\u0026can=1",
              "refsource": "MISC",
              "url": "http://code.google.com/p/smarty-php/issues/detail?id=98\u0026can=1"
            },
            {
              "name": "49164",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49164"
            },
            {
              "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt",
              "refsource": "CONFIRM",
              "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
            },
            {
              "name": "http://code.google.com/p/smarty-php/source/detail?r=4612",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/smarty-php/source/detail?r=4612"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-4277",
    "datePublished": "2012-08-13T22:00:00Z",
    "dateReserved": "2012-08-13T00:00:00Z",
    "dateUpdated": "2024-09-17T01:51:08.501Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-7105
Vulnerability from cvelistv5
Published
2007-03-03 21:00
Modified
2025-01-17 14:15
Severity ?
Summary
PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter. NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:50:06.040Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "smarty-smarty-file-include(29603)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29603"
          },
          {
            "name": "20061014 Vuln",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0292.html"
          },
          {
            "name": "20557",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20557"
          },
          {
            "name": "20061014 Re: Vuln",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0299.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2006-7105",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-04-15T20:11:18.637677Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-94",
                "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-17T14:15:54.762Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter.  NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "smarty-smarty-file-include(29603)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29603"
        },
        {
          "name": "20061014 Vuln",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0292.html"
        },
        {
          "name": "20557",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20557"
        },
        {
          "name": "20061014 Re: Vuln",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0299.html"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-7105",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED **  PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter.  NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "smarty-smarty-file-include(29603)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29603"
            },
            {
              "name": "20061014 Vuln",
              "refsource": "FULLDISC",
              "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0292.html"
            },
            {
              "name": "20557",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20557"
            },
            {
              "name": "20061014 Re: Vuln",
              "refsource": "FULLDISC",
              "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0299.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-7105",
    "datePublished": "2007-03-03T21:00:00",
    "dateReserved": "2007-03-03T00:00:00",
    "dateUpdated": "2025-01-17T14:15:54.762Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-4810
Vulnerability from cvelistv5
Published
2008-10-31 17:18
Modified
2024-08-07 10:31
Severity ?
Summary
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:31:27.520Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "32329",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32329"
          },
          {
            "name": "31862",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31862"
          },
          {
            "name": "smarty-expandquotedtext-code-execution(46031)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46031"
          },
          {
            "name": "DSA-1691",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1691"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/smarty-php/source/detail?r=2784\u0026path=/trunk/libs/Smarty_Compiler.class.php"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://securityvulns.ru/Udocument746.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.gentoo.org/attachment.cgi?id=169804\u0026action=view"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://smarty-php.googlecode.com/svn/trunk/NEWS"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://code.google.com/p/smarty-php/source/detail?r=2797\u0026path=/trunk/libs/Smarty_Compiler.class.php"
          },
          {
            "name": "[oss-security] 20081025 Regarding SA32329 (Smarty \"_expand_quoted_text()\" Security Bypass)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-09-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka \"php executed in templates;\" and (2) a double quoted literal string, aka a \"function injection security hole.\" NOTE: each vector affects slightly different SVN revisions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "32329",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32329"
        },
        {
          "name": "31862",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31862"
        },
        {
          "name": "smarty-expandquotedtext-code-execution(46031)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46031"
        },
        {
          "name": "DSA-1691",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1691"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/smarty-php/source/detail?r=2784\u0026path=/trunk/libs/Smarty_Compiler.class.php"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://securityvulns.ru/Udocument746.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.gentoo.org/attachment.cgi?id=169804\u0026action=view"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://smarty-php.googlecode.com/svn/trunk/NEWS"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://code.google.com/p/smarty-php/source/detail?r=2797\u0026path=/trunk/libs/Smarty_Compiler.class.php"
        },
        {
          "name": "[oss-security] 20081025 Regarding SA32329 (Smarty \"_expand_quoted_text()\" Security Bypass)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4810",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka \"php executed in templates;\" and (2) a double quoted literal string, aka a \"function injection security hole.\" NOTE: each vector affects slightly different SVN revisions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "32329",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32329"
            },
            {
              "name": "31862",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31862"
            },
            {
              "name": "smarty-expandquotedtext-code-execution(46031)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46031"
            },
            {
              "name": "DSA-1691",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1691"
            },
            {
              "name": "http://code.google.com/p/smarty-php/source/detail?r=2784\u0026path=/trunk/libs/Smarty_Compiler.class.php",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/smarty-php/source/detail?r=2784\u0026path=/trunk/libs/Smarty_Compiler.class.php"
            },
            {
              "name": "http://securityvulns.ru/Udocument746.html",
              "refsource": "MISC",
              "url": "http://securityvulns.ru/Udocument746.html"
            },
            {
              "name": "https://bugs.gentoo.org/attachment.cgi?id=169804\u0026action=view",
              "refsource": "CONFIRM",
              "url": "https://bugs.gentoo.org/attachment.cgi?id=169804\u0026action=view"
            },
            {
              "name": "http://smarty-php.googlecode.com/svn/trunk/NEWS",
              "refsource": "CONFIRM",
              "url": "http://smarty-php.googlecode.com/svn/trunk/NEWS"
            },
            {
              "name": "http://code.google.com/p/smarty-php/source/detail?r=2797\u0026path=/trunk/libs/Smarty_Compiler.class.php",
              "refsource": "CONFIRM",
              "url": "http://code.google.com/p/smarty-php/source/detail?r=2797\u0026path=/trunk/libs/Smarty_Compiler.class.php"
            },
            {
              "name": "[oss-security] 20081025 Regarding SA32329 (Smarty \"_expand_quoted_text()\" Security Bypass)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4810",
    "datePublished": "2008-10-31T17:18:00",
    "dateReserved": "2008-10-31T00:00:00",
    "dateUpdated": "2024-08-07T10:31:27.520Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-4727
Vulnerability from cvelistv5
Published
2011-02-03 16:00
Modified
2024-09-16 17:39
Severity ?
Summary
Smarty before 3.0.0 beta 7 does not properly handle the <?php and ?> tags, which has unspecified impact and remote attack vectors.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:55:34.969Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Smarty before 3.0.0 beta 7 does not properly handle the \u003c?php and ?\u003e tags, which has unspecified impact and remote attack vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-02-03T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4727",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Smarty before 3.0.0 beta 7 does not properly handle the \u003c?php and ?\u003e tags, which has unspecified impact and remote attack vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt",
              "refsource": "CONFIRM",
              "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4727",
    "datePublished": "2011-02-03T16:00:00Z",
    "dateReserved": "2011-02-03T00:00:00Z",
    "dateUpdated": "2024-09-16T17:39:15.787Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-1028
Vulnerability from cvelistv5
Published
2019-11-20 14:45
Modified
2024-08-06 22:14
Severity ?
Summary
The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:14:27.221Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security-tracker.debian.org/tracker/CVE-2011-1028"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/cve-2011-1028"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://seclists.org/oss-sec/2011/q1/313"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "smarty3",
          "vendor": "smarty3",
          "versions": [
            {
              "status": "affected",
              "version": "3"
            }
          ]
        }
      ],
      "datePublic": "2011-12-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "UNKNOWN_TYPE",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-20T14:45:10",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security-tracker.debian.org/tracker/CVE-2011-1028"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://access.redhat.com/security/cve/cve-2011-1028"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://seclists.org/oss-sec/2011/q1/313"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-1028",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "smarty3",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "3"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "smarty3"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "UNKNOWN_TYPE"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://security-tracker.debian.org/tracker/CVE-2011-1028",
              "refsource": "MISC",
              "url": "https://security-tracker.debian.org/tracker/CVE-2011-1028"
            },
            {
              "name": "https://access.redhat.com/security/cve/cve-2011-1028",
              "refsource": "MISC",
              "url": "https://access.redhat.com/security/cve/cve-2011-1028"
            },
            {
              "name": "https://seclists.org/oss-sec/2011/q1/313",
              "refsource": "MISC",
              "url": "https://seclists.org/oss-sec/2011/q1/313"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1028",
    "datePublished": "2019-11-20T14:45:10",
    "dateReserved": "2011-02-14T00:00:00",
    "dateUpdated": "2024-08-06T22:14:27.221Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2008-02-28 20:44
Modified
2024-11-21 00:43
Severity ?
Summary
The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
References
cve@mitre.orghttp://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
cve@mitre.orghttp://secunia.com/advisories/29241Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29392Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29398Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29405Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29562Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/29839Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-201111-04.xml
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1520
cve@mitre.orghttp://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652
cve@mitre.orghttp://www.securityfocus.com/bid/28105
cve@mitre.orghttp://www.smarty.net/misc/NEWS
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41002
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html
af854a3a-2127-422b-91ae-364da2661108http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29241Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29392Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29398Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29405Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29562Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29839Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201111-04.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1520
af854a3a-2127-422b-91ae-364da2661108http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28105
af854a3a-2127-422b-91ae-364da2661108http://www.smarty.net/misc/NEWS
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41002
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html
Impacted products
Vendor Product Version
smarty smarty *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B305BAAF-5CF8-4A5C-8E59-B308A754A3A8",
              "versionEndIncluding": "2.6.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a \u0027\\0\u0027 character in a search string."
    },
    {
      "lang": "es",
      "value": "La extensi\u00f3n modifier.regex_replace.php de Smarty before 2.6.19,utilizado como Serendipity (S9Y) y otros productos, permite a atacantes llamar a funciones PHP de su elecci\u00f3n a trav\u00e9s de plantillas, relacionado con un car\u00e1cter \u0027\\0\u0027 en una cadena de b\u00fasqueda."
    }
  ],
  "id": "CVE-2008-1066",
  "lastModified": "2024-11-21T00:43:35.630",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-02-28T20:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29241"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29392"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29398"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29405"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29562"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29839"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-201111-04.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1520"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28105"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.smarty.net/misc/NEWS"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41002"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29392"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29405"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29562"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29839"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201111-04.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28105"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.smarty.net/misc/NEWS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-03-03 21:19
Modified
2025-01-17 15:15
Severity ?
Summary
PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter. NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect
Impacted products
Vendor Product Version
smarty smarty 2.6.9



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "PHP remote file inclusion vulnerability in libs/Smarty.class.php in Smarty 2.6.9 allows remote attackers to execute arbitrary PHP code via a URL in the filename parameter.  NOTE: in the original disclosure, filename is used in a function definition, so this report is probably incorrect"
    },
    {
      "lang": "es",
      "value": "** IMPUGNADA ** Vulnerabilidad PHP de inclusi\u00f3n remota de archivo en libs/Smarty.class.php en Smarty 2.6.9 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de una URL en el par\u00e1metro filename. NOTA: \t\r\nen el acceso original, el nombre de fichero se utiliza en una definici\u00f3n de la funci\u00f3n, as\u00ed que este informe es probablemente incorrecto."
    }
  ],
  "id": "CVE-2006-7105",
  "lastModified": "2025-01-17T15:15:08.970",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2007-03-03T21:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0292.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0299.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/20557"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29603"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0292.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.security-express.com/archives/fulldisclosure/2006-10/0299.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/20557"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29603"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-05-18 18:30
Modified
2024-11-21 01:03
Severity ?
Summary
The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information.
References
cve@mitre.orghttp://osvdb.org/54380
cve@mitre.orghttp://secunia.com/advisories/35072Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/35219
cve@mitre.orghttp://www.securityfocus.com/bid/34918Exploit
cve@mitre.orghttp://www.ubuntu.com/usn/usn-791-3
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/50457
cve@mitre.orghttps://www.exploit-db.com/exploits/8659
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/54380
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35072Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35219
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/34918Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-791-3
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/50457
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/8659
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html
Impacted products
Vendor Product Version
smarty smarty 2.6.22



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n smarty_function_math en libs/plugins/function.math.php en Smarty v2.6.22 permite que atacantes, dependiendo del contexto, ejecutar comandos de su elecci\u00f3n a trav\u00e9s de metacaracteres en el atributo equation de la funci\u00f3n math. NOTE: algunos de esos detalles se han obtenido de informaci\u00f3n de terceros."
    }
  ],
  "evaluatorImpact": "Per http://secunia.com/advisories/35072\r\n\"The vulnerability is confirmed in version 2.6.22 on Windows. Other versions may also be affected.\"",
  "id": "CVE-2009-1669",
  "lastModified": "2024-11-21T01:03:02.520",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-05-18T18:30:00.967",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/54380"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35072"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35219"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/34918"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-791-3"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50457"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/8659"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/54380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35072"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35219"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/34918"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-791-3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50457"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/8659"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:11
Severity ?
Summary
Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18
smarty smarty 2.6.20
smarty smarty 2.6.22
smarty smarty 2.6.24
smarty smarty 2.6.25



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9636F3D4-31B1-4308-AA00-6B3B4CA12B53",
              "versionEndIncluding": "2.6.26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations."
    },
    {
      "lang": "es",
      "value": "El motor de plantillas PHP Smarty en versiones anteriores a la v3.0.0 beta 4 no tiene en cuenta el valor de umask a la hora de establecer los permisos de los archivos, lo que podr\u00eda permitir eludir restricciones de acceso previsto a trav\u00e9s de operaciones del sistema de archivos est\u00e1ndar."
    }
  ],
  "id": "CVE-2009-5054",
  "lastModified": "2024-11-21T01:11:04.940",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-03T17:00:01.837",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-09-11 13:29
Modified
2024-11-21 03:53
Summary
Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.
Impacted products
Vendor Product Version
smarty smarty *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06EEAC1A-30EB-45A0-9533-56BE9A1A93C5",
              "versionEndIncluding": "3.1.32",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement."
    },
    {
      "lang": "es",
      "value": "Smarty en versiones anteriores a la 3.1.33-dev-4 permite que los atacantes omitan el mecanismo de protecci\u00f3n trusted_dir mediante una subcadena file:./../ en una instrucci\u00f3n include."
    }
  ],
  "id": "CVE-2018-16831",
  "lastModified": "2024-11-21T03:53:24.283",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 7.1,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-09-11T13:29:01.293",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/issues/486"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/issues/486"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-10-01 03:26
Modified
2024-11-21 01:42
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2014-0468.html
secalert@redhat.comhttp://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt
secalert@redhat.comhttp://code.google.com/p/smarty-php/source/detail?r=4658Patch
secalert@redhat.comhttp://jvn.jp/en/jp/JVN63650108/index.html
secalert@redhat.comhttp://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html
secalert@redhat.comhttp://secunia.com/advisories/50589Vendor Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2014:221
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/09/19/1
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/09/20/3
secalert@redhat.comhttp://www.securityfocus.com/bid/55506
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2014-0468.html
af854a3a-2127-422b-91ae-364da2661108http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt
af854a3a-2127-422b-91ae-364da2661108http://code.google.com/p/smarty-php/source/detail?r=4658Patch
af854a3a-2127-422b-91ae-364da2661108http://jvn.jp/en/jp/JVN63650108/index.html
af854a3a-2127-422b-91ae-364da2661108http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50589Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2014:221
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/19/1
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/09/20/3
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/55506
Impacted products
Vendor Product Version
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18
smarty smarty 2.6.20
smarty smarty 2.6.22
smarty smarty 2.6.24
smarty smarty 2.6.25
smarty smarty 2.6.26
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.1
smarty smarty 3.0.2
smarty smarty 3.0.3
smarty smarty 3.0.4
smarty smarty 3.0.5
smarty smarty 3.0.6
smarty smarty 3.0.7
smarty smarty 3.1
smarty smarty 3.1.0
smarty smarty 3.1.1
smarty smarty 3.1.2
smarty smarty 3.1.3
smarty smarty 3.1.4
smarty smarty 3.1.5
smarty smarty 3.1.6
smarty smarty 3.1.7
smarty smarty 3.1.8
smarty smarty 3.1.9
smarty smarty 3.1.10
smarty smarty 3.1.11
smarty smarty 3.1.12



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F60BF56B-7165-456C-B7D1-AF6E869B7337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "A46B316A-0D93-4B17-AFF7-C52FFFF361FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "3DC9CDED-796C-4081-83DD-7AE59700FF39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AA427E6-AE83-4227-B45B-BD84569ACA2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C8DB2D9-9D3D-4F01-869F-AA5BEB2891DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE6E86E-623A-4136-9945-1E99629916B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A55A97A-FD19-4385-92D7-D511D53EE38C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F7BBD2A-45A1-4C98-9C73-DBBF2161BE29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB86C08-AE24-4B3C-90FE-917996A0A48C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DADDE896-B711-4ECD-B560-E9665B178173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "293032B8-72CB-4201-901E-3A70613B7518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA2F1ACE-C3BD-4DEA-A317-38CD4928A781",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "469D55FF-5436-4000-8FF3-B3761761A429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C390AB-D6A6-4ABF-AA1E-A9294AC2FD70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "21D02454-647C-43B9-9DAC-A0306FB52F36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF0159CD-A5A9-4C7A-9EDC-9A6BC8740847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB73E7D4-A784-41EF-8DC8-3BF9245A549D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BD8A9C9-FFA8-46E8-874C-F5A31A785102",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE74F83B-33BB-4303-A022-51422BFBB8C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D780E5BB-4DC5-4E7C-A1B5-FE6E9E75B5D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CE55049-426E-4B43-8A55-A643B423A921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "88CDDA12-5690-442E-A893-47E9E2E60617",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D731309D-2418-4382-B565-E74C4593527F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9A9770-5A48-45D8-A3E3-16867CED4B2F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en la clase SmartyException en Smarty (tambi\u00e9n conocido como smarty-php), antes de v3.1.12, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados que desencadenan una excepci\u00f3n Smarty."
    }
  ],
  "id": "CVE-2012-4437",
  "lastModified": "2024-11-21T01:42:53.733",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-10-01T03:26:16.413",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://advisories.mageia.org/MGASA-2014-0468.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/smarty-php/source/detail?r=4658"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://jvn.jp/en/jp/JVN63650108/index.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/50589"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/19/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/20/3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/55506"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://advisories.mageia.org/MGASA-2014-0468.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/smarty-php/source/detail?r=4658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN63650108/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/ja/contents/2012/JVNDB-2012-000094.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088138.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/50589"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/19/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/09/20/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/55506"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-24 15:15
Modified
2024-11-21 06:58
Summary
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.
References
security-advisories@github.comhttps://github.com/smarty-php/smarty/commit/64ad6442ca1da31cefdab5c9874262b702cccdddPatch, Third Party Advisory
security-advisories@github.comhttps://github.com/smarty-php/smarty/releases/tag/v3.1.45Release Notes, Third Party Advisory
security-advisories@github.comhttps://github.com/smarty-php/smarty/releases/tag/v4.1.1Release Notes, Third Party Advisory
security-advisories@github.comhttps://github.com/smarty-php/smarty/security/advisories/GHSA-634x-pc3q-cf4cThird Party Advisory
security-advisories@github.comhttps://lists.debian.org/debian-lts-announce/2022/05/msg00044.htmlMailing List, Third Party Advisory
security-advisories@github.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/
security-advisories@github.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/
security-advisories@github.comhttps://security.gentoo.org/glsa/202209-09Third Party Advisory
security-advisories@github.comhttps://www.debian.org/security/2022/dsa-5151Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/commit/64ad6442ca1da31cefdab5c9874262b702cccdddPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/releases/tag/v3.1.45Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/releases/tag/v4.1.1Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/security/advisories/GHSA-634x-pc3q-cf4cThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2022/05/msg00044.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202209-09Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2022/dsa-5151Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8429DA48-CC42-447B-9273-9755C7A33248",
              "versionEndExcluding": "3.1.45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF0778C-6739-4DE6-BB51-B6B466C0B104",
              "versionEndExcluding": "4.1.1",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds."
    },
    {
      "lang": "es",
      "value": "Smarty es un motor de plantillas para PHP, que facilita la separaci\u00f3n de la presentaci\u00f3n (HTML/CSS) de la l\u00f3gica de la aplicaci\u00f3n. En versiones anteriores a 3.1.45 y 4.1.1, los autores de plantillas pod\u00edan inyectar c\u00f3digo php eligiendo un nombre de archivo {block} o {include} malicioso. Los sitios que no pueden confiar plenamente en los autores de plantillas deben actualizar a versiones 3.1.45 o 4.1.1 para recibir un parche para este problema. Actualmente no se presentan mitigaciones conocidas"
    }
  ],
  "id": "CVE-2022-29221",
  "lastModified": "2024-11-21T06:58:44.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-24T15:15:07.917",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/64ad6442ca1da31cefdab5c9874262b702cccddd"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.45"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v4.1.1"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-634x-pc3q-cf4c"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00044.html"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202209-09"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/64ad6442ca1da31cefdab5c9874262b702cccddd"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.45"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v4.1.1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-634x-pc3q-cf4c"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00044.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202209-09"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5151"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-20 15:15
Modified
2024-11-21 01:25
Severity ?
Summary
The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.
Impacted products
Vendor Product Version
smarty smarty *
debian debian_linux 8.0
debian debian_linux 9.0
debian debian_linux 10.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D0F21F-BBEF-4104-A994-A7C67B18AA70",
              "versionEndExcluding": "3.0.7",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file."
    },
    {
      "lang": "es",
      "value": "La variable $smarty.template en Smarty3 permite a atacantes posiblemente ejecutar c\u00f3digo PHP arbitrario por medio del archivo sysplugins/smarty_internal_compile_private_special_variable.php."
    }
  ],
  "id": "CVE-2011-1028",
  "lastModified": "2024-11-21T01:25:21.757",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-20T15:15:11.023",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "https://access.redhat.com/security/cve/cve-2011-1028"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/oss-sec/2011/q1/313"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2011-1028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://access.redhat.com/security/cve/cve-2011-1028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/oss-sec/2011/q1/313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2011-1028"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-01-10 20:15
Modified
2024-11-21 06:01
Summary
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.
References
security-advisories@github.comhttps://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71Patch, Third Party Advisory
security-advisories@github.comhttps://github.com/smarty-php/smarty/releases/tag/v3.1.42Release Notes, Third Party Advisory
security-advisories@github.comhttps://github.com/smarty-php/smarty/releases/tag/v4.0.2Release Notes, Third Party Advisory
security-advisories@github.comhttps://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6mThird Party Advisory
security-advisories@github.comhttps://lists.debian.org/debian-lts-announce/2022/05/msg00005.htmlMailing List, Third Party Advisory
security-advisories@github.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/
security-advisories@github.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/
security-advisories@github.comhttps://packagist.org/packages/smarty/smartyProduct, Third Party Advisory
security-advisories@github.comhttps://security.gentoo.org/glsa/202209-09Third Party Advisory
security-advisories@github.comhttps://www.debian.org/security/2022/dsa-5151Third Party Advisory
security-advisories@github.comhttps://www.smarty.net/docs/en/language.function.math.tplVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/releases/tag/v3.1.42Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/releases/tag/v4.0.2Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6mThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2022/05/msg00005.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/
af854a3a-2127-422b-91ae-364da2661108https://packagist.org/packages/smarty/smartyProduct, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202209-09Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2022/dsa-5151Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.smarty.net/docs/en/language.function.math.tplVendor Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F2A8FC7-D5C2-4D88-A172-000065020043",
              "versionEndExcluding": "3.1.42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C66B5163-B419-4BBF-8F97-C6CFEB9CB37A",
              "versionEndExcluding": "4.0.2",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch."
    },
    {
      "lang": "es",
      "value": "Smarty es un motor de plantillas para PHP que facilita la separaci\u00f3n de la presentaci\u00f3n (HTML/CSS) de la l\u00f3gica de la aplicaci\u00f3n. Antes de las versiones 3.1.42 y 4.0.2, los autores de plantillas pod\u00edan ejecutar c\u00f3digo PHP arbitrario al dise\u00f1ar una cadena matem\u00e1tica maliciosa. Si era pasada una cadena matem\u00e1tica como datos proporcionados por el usuario a la funci\u00f3n matem\u00e1tica, los usuarios externos pod\u00edan ejecutar c\u00f3digo PHP arbitrario al dise\u00f1ar una cadena matem\u00e1tica maliciosa. Los usuarios deben actualizar a la versi\u00f3n 3.1.42 o 4.0.2 para recibir un parche"
    }
  ],
  "id": "CVE-2021-29454",
  "lastModified": "2024-11-21T06:01:08.007",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-01-10T20:15:08.000",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.42"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.2"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Product",
        "Third Party Advisory"
      ],
      "url": "https://packagist.org/packages/smarty/smarty"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202209-09"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5151"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.smarty.net/docs/en/language.function.math.tpl"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.42"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product",
        "Third Party Advisory"
      ],
      "url": "https://packagist.org/packages/smarty/smarty"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202209-09"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.smarty.net/docs/en/language.function.math.tpl"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-74"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-74"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-04-12 19:19
Modified
2024-11-21 00:24
Severity ?
Summary
PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter. NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant
Impacted products
Vendor Product Version
smarty smarty 2.6.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter.  NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant"
    },
    {
      "lang": "es",
      "value": "** IMPUGNADO ** Vulnerabilidad de inclusi\u00f3n remota de archivo en PHP en unit_test/test_cases.php en Smarty 2.6.1 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro SMARTY_DIR.\r\nNOTA: esta vulnerabilidad se impugna por CVE y una tercera parte porque SMARTY_DIR es una constante."
    }
  ],
  "id": "CVE-2006-7193",
  "lastModified": "2024-11-21T00:24:36.423",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-04-12T19:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=116163668213491\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=116170769322920\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/31096"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29739"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=116163668213491\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=116170769322920\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/31096"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/29739"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:11
Severity ?
Summary
Multiple unspecified vulnerabilities in Smarty before 3.0.0 beta 6 have unknown impact and attack vectors.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18
smarty smarty 2.6.20
smarty smarty 2.6.22
smarty smarty 2.6.24
smarty smarty 2.6.25
smarty smarty 2.6.26
smarty smarty 3.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "742E17E7-7859-4D73-84C1-9BB236F06CD7",
              "versionEndIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in Smarty before 3.0.0 beta 6 have unknown impact and attack vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en versiones de Smarty anteriores a la v3.0.0 beta 6 tienen un impacto desconocido y vectores de ataque."
    }
  ],
  "id": "CVE-2009-5052",
  "lastModified": "2024-11-21T01:11:04.667",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-03T17:00:01.727",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:21
Severity ?
Summary
Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18
smarty smarty 2.6.20
smarty smarty 2.6.22
smarty smarty 2.6.24
smarty smarty 2.6.25
smarty smarty 2.6.26
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "7C07EACF-81E3-4102-883C-BE55B2F832A9",
              "versionEndIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "A46B316A-0D93-4B17-AFF7-C52FFFF361FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "El motor de plantillas PHP Smarty v3.0.0, cuando la seguridad est\u00e1 habilitada, no impide el acceso a los miembros tanto de los objetos (1) din\u00e1micos como (2) privados de un objeto asignado, lo cual tiene un impacto no especificado y vectores de ataque a distancia."
    }
  ],
  "id": "CVE-2010-4723",
  "lastModified": "2024-11-21T01:21:36.683",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-03T17:00:01.947",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-03-28 21:15
Modified
2024-11-21 07:55
Summary
Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user's browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application's behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability.
References
security-advisories@github.comhttps://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713dPatch
security-advisories@github.comhttps://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwjThird Party Advisory
security-advisories@github.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSAUM3YHWHO4UCJXRGRLQGPJAO3MFOZZ/Mailing List, Third Party Advisory
security-advisories@github.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBB35GLYTL6JL6EOM6BOZNYP47JKNNHT/Mailing List, Third Party Advisory
security-advisories@github.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7O7SKTATM6GAP45S64QFXNLWIY5I7HP/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713dPatch
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwjThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSAUM3YHWHO4UCJXRGRLQGPJAO3MFOZZ/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBB35GLYTL6JL6EOM6BOZNYP47JKNNHT/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7O7SKTATM6GAP45S64QFXNLWIY5I7HP/Mailing List, Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E84A24D-C1B5-4218-A407-96D45BDB859D",
              "versionEndExcluding": "3.1.48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "20285F83-0020-4AF8-BD31-CFCA7E02B630",
              "versionEndExcluding": "4.3.1",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty is a template engine for PHP. In affected versions smarty did not properly escape javascript code. An attacker could exploit this vulnerability to execute arbitrary JavaScript code in the context of the user\u0027s browser session. This may lead to unauthorized access to sensitive user data, manipulation of the web application\u0027s behavior, or unauthorized actions performed on behalf of the user. Users are advised to upgrade to either version 3.1.48 or to 4.3.1 to resolve this issue. There are no known workarounds for this vulnerability."
    }
  ],
  "id": "CVE-2023-28447",
  "lastModified": "2024-11-21T07:55:05.890",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.7,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-03-28T21:15:11.127",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSAUM3YHWHO4UCJXRGRLQGPJAO3MFOZZ/"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBB35GLYTL6JL6EOM6BOZNYP47JKNNHT/"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7O7SKTATM6GAP45S64QFXNLWIY5I7HP/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/685662466f653597428966d75a661073104d713d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-7j98-h7fp-4vwj"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HSAUM3YHWHO4UCJXRGRLQGPJAO3MFOZZ/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JBB35GLYTL6JL6EOM6BOZNYP47JKNNHT/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7O7SKTATM6GAP45S64QFXNLWIY5I7HP/"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-13 22:55
Modified
2024-11-21 01:42
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the smarty_function_html_options_optoutput function in distribution/libs/plugins/function.html_options.php in Smarty before 3.1.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18
smarty smarty 2.6.20
smarty smarty 2.6.22
smarty smarty 2.6.24
smarty smarty 2.6.25
smarty smarty 2.6.26
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.1
smarty smarty 3.0.2
smarty smarty 3.0.3
smarty smarty 3.0.4
smarty smarty 3.0.5
smarty smarty 3.0.6
smarty smarty 3.0.7
smarty smarty 3.1
smarty smarty 3.1.0
smarty smarty 3.1.1
smarty smarty 3.1.2
smarty smarty 3.1.3
smarty smarty 3.1.4
smarty smarty 3.1.5
smarty smarty 3.1.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA09B71B-B1EE-42E9-891C-A023FB731798",
              "versionEndIncluding": "3.1.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F60BF56B-7165-456C-B7D1-AF6E869B7337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "A46B316A-0D93-4B17-AFF7-C52FFFF361FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "3DC9CDED-796C-4081-83DD-7AE59700FF39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AA427E6-AE83-4227-B45B-BD84569ACA2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C8DB2D9-9D3D-4F01-869F-AA5BEB2891DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE6E86E-623A-4136-9945-1E99629916B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A55A97A-FD19-4385-92D7-D511D53EE38C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F7BBD2A-45A1-4C98-9C73-DBBF2161BE29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB86C08-AE24-4B3C-90FE-917996A0A48C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DADDE896-B711-4ECD-B560-E9665B178173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "293032B8-72CB-4201-901E-3A70613B7518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA2F1ACE-C3BD-4DEA-A317-38CD4928A781",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "469D55FF-5436-4000-8FF3-B3761761A429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C390AB-D6A6-4ABF-AA1E-A9294AC2FD70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "21D02454-647C-43B9-9DAC-A0306FB52F36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF0159CD-A5A9-4C7A-9EDC-9A6BC8740847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB73E7D4-A784-41EF-8DC8-3BF9245A549D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BD8A9C9-FFA8-46E8-874C-F5A31A785102",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the smarty_function_html_options_optoutput function in distribution/libs/plugins/function.html_options.php in Smarty before 3.1.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en la funci\u00f3n smarty_function_html_options_optoutput en  distribution/libs/plugins/function.html_options.php en Smarty antes de v3.1.8 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados.\r\n"
    }
  ],
  "id": "CVE-2012-4277",
  "lastModified": "2024-11-21T01:42:36.433",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-13T22:55:01.770",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://code.google.com/p/smarty-php/issues/detail?id=98\u0026can=1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/smarty-php/source/detail?r=4612"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49164"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1027061"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://code.google.com/p/smarty-php/issues/detail?id=98\u0026can=1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://code.google.com/p/smarty-php/source/detail?r=4612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1027061"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-09-18 21:29
Modified
2024-11-21 03:48
Summary
Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.
References
cve@mitre.orghttps://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_TraversalExploit, Patch, Third Party Advisory
cve@mitre.orghttps://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50Patch, Vendor Advisory
cve@mitre.orghttps://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfePatch, Vendor Advisory
cve@mitre.orghttps://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531Patch, Vendor Advisory
cve@mitre.orghttps://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1Patch, Vendor Advisory
cve@mitre.orghttps://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8Patch, Vendor Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2021/04/msg00004.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2021/04/msg00014.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2021/10/msg00015.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_TraversalExploit, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfePatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/04/msg00004.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/04/msg00014.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/10/msg00015.htmlMailing List, Third Party Advisory
Impacted products
Vendor Product Version
smarty smarty *
debian debian_linux 9.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0613AA6E-3478-438E-974B-88FF5DC03791",
              "versionEndExcluding": "3.1.33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files."
    },
    {
      "lang": "es",
      "value": "Smarty_Security::isTrustedResourceDir() en Smarty en versiones anteriores a la 3.1.33 es propenso a una vulnerabilidad de salto de directorio debido al saneamiento insuficiente de c\u00f3digos de plantilla. Esto permite que los atacantes que controlan el c\u00f3digo de plantilla ejecutado omitan las restricciones de seguridad del directorio de confianza y lean archivos arbitrarios."
    }
  ],
  "id": "CVE-2018-13982",
  "lastModified": "2024-11-21T03:48:22.357",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-09-18T21:29:02.247",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-22 02:15
Modified
2024-11-21 05:55
Severity ?
Summary
Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring.
Impacted products
Vendor Product Version
smarty smarty *
debian debian_linux 9.0
debian debian_linux 10.0
debian debian_linux 11.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC1FB377-4E78-4086-BCA1-0B6805311AA7",
              "versionEndExcluding": "3.1.39",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring."
    },
    {
      "lang": "es",
      "value": "Smarty versiones anteriores a 3.1.39, permite una inyecci\u00f3n de c\u00f3digo por medio de un nombre de funci\u00f3n no previsto despu\u00e9s de una subcadena {function name="
    }
  ],
  "id": "CVE-2021-26120",
  "lastModified": "2024-11-21T05:55:54.330",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-22T02:15:14.323",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202105-06"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202105-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5151"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-01-10 20:15
Modified
2024-11-21 05:48
Summary
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0.3, template authors could run restricted static php methods. Users should upgrade to version 3.1.43 or 4.0.3 to receive a patch.
References
security-advisories@github.comhttps://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664Patch, Third Party Advisory
security-advisories@github.comhttps://github.com/smarty-php/smarty/releases/tag/v3.1.43Release Notes, Third Party Advisory
security-advisories@github.comhttps://github.com/smarty-php/smarty/releases/tag/v4.0.3Release Notes, Third Party Advisory
security-advisories@github.comhttps://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6mThird Party Advisory
security-advisories@github.comhttps://lists.debian.org/debian-lts-announce/2022/05/msg00005.htmlMailing List, Third Party Advisory
security-advisories@github.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/
security-advisories@github.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/
security-advisories@github.comhttps://security.gentoo.org/glsa/202209-09Third Party Advisory
security-advisories@github.comhttps://www.debian.org/security/2022/dsa-5151Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/releases/tag/v3.1.43Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/releases/tag/v4.0.3Release Notes, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6mThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2022/05/msg00005.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202209-09Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2022/dsa-5151Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB541921-C8E7-479B-9CA1-9C3F136C412A",
              "versionEndExcluding": "3.1.43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AB12C55-A7CF-495E-B2F8-761BF5912943",
              "versionEndExcluding": "4.0.3",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0.3, template authors could run restricted static php methods. Users should upgrade to version 3.1.43 or 4.0.3 to receive a patch."
    },
    {
      "lang": "es",
      "value": "Smarty es un motor de plantillas para PHP que facilita la separaci\u00f3n de la presentaci\u00f3n (HTML/CSS) de la l\u00f3gica de la aplicaci\u00f3n. Antes de las versiones 3.1.43 y 4.0.3, los autores de plantillas pod\u00edan ejecutar m\u00e9todos est\u00e1ticos restringidos de php. Los usuarios deben actualizar a la versi\u00f3n 3.1.43 o 4.0.3 para recibir el parche"
    }
  ],
  "id": "CVE-2021-21408",
  "lastModified": "2024-11-21T05:48:17.783",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "security-advisories@github.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-01-10T20:15:07.913",
  "references": [
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.43"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.3"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/"
    },
    {
      "source": "security-advisories@github.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202209-09"
    },
    {
      "source": "security-advisories@github.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.43"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v4.0.3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRAJVDRGCIY5UZ2PQHKDTT7RMKG6WJQQ/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L777JIBIWJV34HS7LXPIDWASG7TT4LNI/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202209-09"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5151"
    }
  ],
  "sourceIdentifier": "security-advisories@github.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "security-advisories@github.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-09-29 14:15
Modified
2024-11-21 08:21
Summary
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin <= 3.1.35 versions.
Impacted products
Vendor Product Version
smarty smarty *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:wordpress:*:*",
              "matchCriteriaId": "C4688979-8FCE-4AB2-A0E2-F8A76435BC67",
              "versionEndIncluding": "3.1.35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in PressPage Entertainment Inc. Smarty for WordPress plugin \u003c=\u00a03.1.35 versions."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de admin o superiores) almacenada en PressPage Entertainment Inc. Smarty para el complemento WordPress en versiones \u0026lt;=  3.1.35."
    }
  ],
  "id": "CVE-2023-41661",
  "lastModified": "2024-11-21T08:21:26.417",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.7,
        "impactScore": 3.7,
        "source": "audit@patchstack.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.7,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-09-29T14:15:10.500",
  "references": [
    {
      "source": "audit@patchstack.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://patchstack.com/database/vulnerability/smarty-for-wordpress/wordpress-smarty-for-wordpress-plugin-3-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://patchstack.com/database/vulnerability/smarty-for-wordpress/wordpress-smarty-for-wordpress-plugin-3-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve"
    }
  ],
  "sourceIdentifier": "audit@patchstack.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "audit@patchstack.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-22 02:15
Modified
2024-11-21 05:55
Summary
Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.
Impacted products
Vendor Product Version
smarty smarty *
debian debian_linux 9.0
debian debian_linux 10.0
debian debian_linux 11.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC1FB377-4E78-4086-BCA1-0B6805311AA7",
              "versionEndExcluding": "3.1.39",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode."
    },
    {
      "lang": "es",
      "value": "Smarty versiones anteriores a 3.1.39, permite un Escape del Sandbox porque un $smarty.template_object puede ser accedido en el modo sandbox"
    }
  ],
  "id": "CVE-2021-26119",
  "lastModified": "2024-11-21T05:55:54.163",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-22T02:15:14.260",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202105-06"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202105-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5151"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2024-11-20 23:56
Severity ?
Summary
Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code.
Impacted products
Vendor Product Version
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code."
    }
  ],
  "id": "CVE-2005-0913",
  "lastModified": "2024-11-20T23:56:10.357",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://news.php.net/php.smarty.dev/2673"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14729/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200503-35.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1013556"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/12941"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19880"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://news.php.net/php.smarty.dev/2673"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14729/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200503-35.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/id?1013556"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/12941"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19880"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:11
Severity ?
Summary
Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18
smarty smarty 2.6.20
smarty smarty 2.6.22
smarty smarty 2.6.24
smarty smarty 2.6.25
smarty smarty 2.6.26
smarty smarty 3.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "742E17E7-7859-4D73-84C1-9BB236F06CD7",
              "versionEndIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en Smarty anterior a v3.0.0 beta 6 permite a atacantes remotos ejecutar c\u00f3digo PHP arbitrario inyectando este c\u00f3digo dentro de un fichero cache."
    }
  ],
  "id": "CVE-2009-5053",
  "lastModified": "2024-11-21T01:11:04.800",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-03T17:00:01.773",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:21
Severity ?
Summary
Smarty before 3.0.0 beta 7 does not properly handle the <?php and ?> tags, which has unspecified impact and remote attack vectors.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18
smarty smarty 2.6.20
smarty smarty 2.6.22
smarty smarty 2.6.24
smarty smarty 2.6.25
smarty smarty 2.6.26
smarty smarty 3.0.0
smarty smarty 3.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "E69E7105-4FE0-4723-925B-0F5D30B91FED",
              "versionEndIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty before 3.0.0 beta 7 does not properly handle the \u003c?php and ?\u003e tags, which has unspecified impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "Smarty anterior a v3.0.0 beta 7 no controla correctamente las etiquetas \u003c? php y?\u003e, teniendo un impacto no especificado y vectores de ataque remotos."
    }
  ],
  "id": "CVE-2010-4727",
  "lastModified": "2024-11-21T01:21:37.237",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-03T17:00:02.117",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-09-15 00:15
Modified
2024-11-21 04:03
Summary
In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty *
debian debian_linux 10.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C07B998-ABE8-4F99-8A25-EEEBBC27599E",
              "versionEndExcluding": "3.1.47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4C5DBC8-BA50-48A6-965D-2BC0750735CE",
              "versionEndExcluding": "4.2.1",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user."
    },
    {
      "lang": "es",
      "value": "En Smarty versiones anteriores a 3.1.47 y 4.x anteriores a 4.2.1, el archivo libs/plugins/function.mailto.php permite un ataque de tipo XSS. Una p\u00e1gina web que usa smarty_function_mailto, y que pueda ser parametrizada usando par\u00e1metros de entrada GET o POST, podr\u00eda permitir una inyecci\u00f3n de c\u00f3digo JavaScript por parte de un usuario"
    }
  ],
  "id": "CVE-2018-25047",
  "lastModified": "2024-11-21T04:03:26.110",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-15T00:15:09.580",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugs.gentoo.org/870100"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/issues/454"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.47"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v4.2.1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202209-09"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugs.gentoo.org/870100"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/issues/454"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v3.1.47"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://github.com/smarty-php/smarty/releases/tag/v4.2.1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202209-09"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-10-31 18:09
Modified
2024-11-21 00:52
Severity ?
Summary
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions.
References
cve@mitre.orghttp://code.google.com/p/smarty-php/source/detail?r=2784&path=/trunk/libs/Smarty_Compiler.class.php
cve@mitre.orghttp://code.google.com/p/smarty-php/source/detail?r=2797&path=/trunk/libs/Smarty_Compiler.class.php
cve@mitre.orghttp://secunia.com/advisories/32329Vendor Advisory
cve@mitre.orghttp://securityvulns.ru/Udocument746.html
cve@mitre.orghttp://smarty-php.googlecode.com/svn/trunk/NEWS
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1691
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/10/25/2
cve@mitre.orghttp://www.securityfocus.com/bid/31862
cve@mitre.orghttps://bugs.gentoo.org/attachment.cgi?id=169804&action=view
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/46031
af854a3a-2127-422b-91ae-364da2661108http://code.google.com/p/smarty-php/source/detail?r=2784&path=/trunk/libs/Smarty_Compiler.class.php
af854a3a-2127-422b-91ae-364da2661108http://code.google.com/p/smarty-php/source/detail?r=2797&path=/trunk/libs/Smarty_Compiler.class.php
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32329Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityvulns.ru/Udocument746.html
af854a3a-2127-422b-91ae-364da2661108http://smarty-php.googlecode.com/svn/trunk/NEWS
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1691
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/10/25/2
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31862
af854a3a-2127-422b-91ae-364da2661108https://bugs.gentoo.org/attachment.cgi?id=169804&action=view
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/46031
Impacted products
Vendor Product Version
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka \"php executed in templates;\" and (2) a double quoted literal string, aka a \"function injection security hole.\" NOTE: each vector affects slightly different SVN revisions."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n _expand_quoted_text en libs/Smarty_Compiler.class.php en Smarty 2.6.20 antes de r2797 permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante vectores relacionados con plantillas y (1) un car\u00e1cter del signo del d\u00f3lar, tambi\u00e9n conocido como \"php ejecutado en plantillas\"; y (2) una cadena de un literal con dobles comillas, tambi\u00e9n conocido como \"agujero de seguridad en inyecci\u00f3n de funci\u00f3n\". NOTA: cada vector afecta de un modo ligeramente diferente a las revisiones SVN."
    }
  ],
  "id": "CVE-2008-4810",
  "lastModified": "2024-11-21T00:52:37.437",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-10-31T18:09:08.540",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://code.google.com/p/smarty-php/source/detail?r=2784\u0026path=/trunk/libs/Smarty_Compiler.class.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://code.google.com/p/smarty-php/source/detail?r=2797\u0026path=/trunk/libs/Smarty_Compiler.class.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32329"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityvulns.ru/Udocument746.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://smarty-php.googlecode.com/svn/trunk/NEWS"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1691"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/31862"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugs.gentoo.org/attachment.cgi?id=169804\u0026action=view"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46031"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/smarty-php/source/detail?r=2784\u0026path=/trunk/libs/Smarty_Compiler.class.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://code.google.com/p/smarty-php/source/detail?r=2797\u0026path=/trunk/libs/Smarty_Compiler.class.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32329"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityvulns.ru/Udocument746.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://smarty-php.googlecode.com/svn/trunk/NEWS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/31862"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugs.gentoo.org/attachment.cgi?id=169804\u0026action=view"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46031"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-10-31 18:09
Modified
2024-11-21 00:52
Severity ?
Summary
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A20DDC-B660-4707-9CF6-76998641F161",
              "versionEndIncluding": "2.6.20",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \\ (backslash) before a dollar-sign character."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n _expand_quoted_text en libs/Smarty_Compiler.class.php en Smarty 2.6.20 r2797 y anteriores permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante vectores relacionados con plantillas y una \\ (barra invertida) antes de un car\u00e1cter del signo del d\u00f3lar."
    }
  ],
  "id": "CVE-2008-4811",
  "lastModified": "2024-11-21T00:52:37.600",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-10-31T18:09:08.570",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32329"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityvulns.ru/Udocument746.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1691"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/31862"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32329"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityvulns.ru/Udocument746.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/10/25/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/31862"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46406"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:21
Severity ?
Summary
Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18
smarty smarty 2.6.20
smarty smarty 2.6.22
smarty smarty 2.6.24
smarty smarty 2.6.25
smarty smarty 2.6.26
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6954746D-86EE-43C0-B30B-5E04609A68BC",
              "versionEndIncluding": "3.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F60BF56B-7165-456C-B7D1-AF6E869B7337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "A46B316A-0D93-4B17-AFF7-C52FFFF361FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "3DC9CDED-796C-4081-83DD-7AE59700FF39",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en el plugin \u0027fetch\u0027 del motor de plantillas PHP Smarty v3.0.2 tiene un impacto desconocido y vectores de ataque a distancia."
    }
  ],
  "id": "CVE-2010-4722",
  "lastModified": "2024-11-21T01:21:36.540",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-03T17:00:01.900",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-11-03 16:55
Modified
2024-11-21 02:18
Severity ?
Summary
Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18
smarty smarty 2.6.20
smarty smarty 2.6.22
smarty smarty 2.6.24
smarty smarty 2.6.25
smarty smarty 2.6.26
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.1
smarty smarty 3.0.2
smarty smarty 3.0.3
smarty smarty 3.0.4
smarty smarty 3.0.5
smarty smarty 3.0.6
smarty smarty 3.0.7
smarty smarty 3.1
smarty smarty 3.1.0
smarty smarty 3.1.1
smarty smarty 3.1.2
smarty smarty 3.1.3
smarty smarty 3.1.4
smarty smarty 3.1.5
smarty smarty 3.1.6
smarty smarty 3.1.7
smarty smarty 3.1.8
smarty smarty 3.1.9
smarty smarty 3.1.10
smarty smarty 3.1.11
smarty smarty 3.1.12
smarty smarty 3.1.13
smarty smarty 3.1.14
smarty smarty 3.1.15
smarty smarty 3.1.16
smarty smarty 3.1.17
smarty smarty 3.1.18
smarty smarty 3.1.19



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "996AF6BF-920D-4A80-83C9-A367B7024537",
              "versionEndIncluding": "3.1.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F60BF56B-7165-456C-B7D1-AF6E869B7337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "A46B316A-0D93-4B17-AFF7-C52FFFF361FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "3DC9CDED-796C-4081-83DD-7AE59700FF39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AA427E6-AE83-4227-B45B-BD84569ACA2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C8DB2D9-9D3D-4F01-869F-AA5BEB2891DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE6E86E-623A-4136-9945-1E99629916B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A55A97A-FD19-4385-92D7-D511D53EE38C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F7BBD2A-45A1-4C98-9C73-DBBF2161BE29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB86C08-AE24-4B3C-90FE-917996A0A48C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DADDE896-B711-4ECD-B560-E9665B178173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "293032B8-72CB-4201-901E-3A70613B7518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA2F1ACE-C3BD-4DEA-A317-38CD4928A781",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "469D55FF-5436-4000-8FF3-B3761761A429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C390AB-D6A6-4ABF-AA1E-A9294AC2FD70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "21D02454-647C-43B9-9DAC-A0306FB52F36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF0159CD-A5A9-4C7A-9EDC-9A6BC8740847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB73E7D4-A784-41EF-8DC8-3BF9245A549D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BD8A9C9-FFA8-46E8-874C-F5A31A785102",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE74F83B-33BB-4303-A022-51422BFBB8C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D780E5BB-4DC5-4E7C-A1B5-FE6E9E75B5D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CE55049-426E-4B43-8A55-A643B423A921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "88CDDA12-5690-442E-A893-47E9E2E60617",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D731309D-2418-4382-B565-E74C4593527F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9A9770-5A48-45D8-A3E3-16867CED4B2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F9C2F03-33E0-4A2B-B363-68DC3337AF22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5346D673-2803-4F22-A66F-3398D0999816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "05ECDD17-2C52-4C74-99C5-7047C56B6DCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E3A977F-9F73-401E-AD8E-A165F5BEE622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "3718C076-3A47-46F6-A780-A4FF7FC03062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC520821-A9AA-47BB-A771-DFF0692A77C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C211F361-2A62-4D69-ADDA-657417657EFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by \"{literal}\u003c{/literal}script language=php\u003e\" in a template."
    },
    {
      "lang": "es",
      "value": "Smarty anterior a 3.1.21 permite a atacantes remotos evadir las restricciones del modo seguro y ejecutar c\u00f3digo PHP arbitrario tal y como fue demostrado por \u0027{literal}\u003c{/literal}script language=php\u003e\u0027 en una plantilla."
    }
  ],
  "id": "CVE-2014-8350",
  "lastModified": "2024-11-21T02:18:55.087",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-11-03T16:55:08.010",
  "references": [
    {
      "source": "security@debian.org",
      "url": "http://advisories.mageia.org/MGASA-2014-0468.html"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/oss-sec/2014/q4/420"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/oss-sec/2014/q4/421"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.securityfocus.com/bid/70708"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920"
    },
    {
      "source": "security@debian.org",
      "url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902"
    },
    {
      "source": "security@debian.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://advisories.mageia.org/MGASA-2014-0468.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/oss-sec/2014/q4/420"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/oss-sec/2014/q4/421"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/70708"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725"
    }
  ],
  "sourceIdentifier": "security@debian.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:21
Severity ?
Summary
Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18
smarty smarty 2.6.20
smarty smarty 2.6.22
smarty smarty 2.6.24
smarty smarty 2.6.25
smarty smarty 2.6.26
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "6207715A-D4B8-44DC-8E02-7454C82EB09F",
              "versionEndIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "El motor de plantillas PHP Smarty antes de su versi\u00f3n v3.0.0 RC3 no controla correctamente el valor de la opci\u00f3n asp_tags del archivo php.ini, lo cual tiene un impacto no especificado y vectores de ataque a distancia."
    }
  ],
  "id": "CVE-2010-4725",
  "lastModified": "2024-11-21T01:21:36.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-03T17:00:02.023",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:21
Severity ?
Summary
Multiple unspecified vulnerabilities in the parser implementation in Smarty before 3.0.0 RC3 have unknown impact and remote attack vectors.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18
smarty smarty 2.6.20
smarty smarty 2.6.22
smarty smarty 2.6.24
smarty smarty 2.6.25
smarty smarty 2.6.26
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "6207715A-D4B8-44DC-8E02-7454C82EB09F",
              "versionEndIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple unspecified vulnerabilities in the parser implementation in Smarty before 3.0.0 RC3 have unknown impact and remote attack vectors."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades no especificadas en la implementaci\u00f3n del analizador de p\u00e1ginas web de Smarty en versiones anteriores a la v3.0.0 RC3 tienen un impacto desconocido y vectores de ataque a distancia."
    }
  ],
  "id": "CVE-2010-4724",
  "lastModified": "2024-11-21T01:21:36.827",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-03T17:00:01.977",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-02-03 17:00
Modified
2024-11-21 01:21
Severity ?
Summary
Unspecified vulnerability in the math plugin in Smarty before 3.0.0 RC1 has unknown impact and remote attack vectors. NOTE: this might overlap CVE-2009-1669.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18
smarty smarty 2.6.20
smarty smarty 2.6.22
smarty smarty 2.6.24
smarty smarty 2.6.25
smarty smarty 2.6.26
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "1B595782-9432-44A0-92C6-5964330267F8",
              "versionEndIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the math plugin in Smarty before 3.0.0 RC1 has unknown impact and remote attack vectors.  NOTE: this might overlap CVE-2009-1669."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad no especificada en el plug-in \u0027math\u0027 de Smarty antes de v3.0.0 RC1 tiene un impacto desconocido y vectores de ataque remotos. NOTA: esto podr\u00eda superponerse al CVE-2009-1669."
    }
  ],
  "id": "CVE-2010-4726",
  "lastModified": "2024-11-21T01:21:37.100",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-02-03T17:00:02.070",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://smarty-php.googlecode.com/svn/trunk/distribution/change_log.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-01-03 18:29
Modified
2024-11-21 03:04
Severity ?
Summary
Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.
Impacted products
Vendor Product Version
smarty smarty *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "079D6950-7B16-4224-A87F-3858874D9FF6",
              "versionEndExcluding": "3.1.32",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name."
    },
    {
      "lang": "es",
      "value": "Smarty 3, en versiones anteriores a la 3.1.32, es vulnerable a una inyecci\u00f3n de c\u00f3digo PHP al llamar a las funciones fetch() o display() en recursos personalizados que no sanean el nombre de la plantilla."
    }
  ],
  "id": "CVE-2017-1000480",
  "lastModified": "2024-11-21T03:04:49.670",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-01-03T18:29:00.370",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/blob/master/change_log.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.debian.org/security/2018/dsa-4094"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Third Party Advisory"
      ],
      "url": "https://github.com/smarty-php/smarty/blob/master/change_log.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.debian.org/security/2018/dsa-4094"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

jvndb-2012-000094
Vulnerability from jvndb
Published
2012-10-10 14:45
Modified
2012-10-10 14:45
Severity ?
() - -
Summary
Smarty vulnerable to cross-site scripting
Details
Smarty contains a cross-site scripting vulnerability. Smarty is a template engine for PHP. Smarty contains a cross-site scripting vulnerability when displaying an error message. Yuji Tounai of bogus.jp reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Impacted products
SmartySmarty
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000094.html",
  "dc:date": "2012-10-10T14:45+09:00",
  "dcterms:issued": "2012-10-10T14:45+09:00",
  "dcterms:modified": "2012-10-10T14:45+09:00",
  "description": "Smarty contains a cross-site scripting vulnerability.\r\n\r\nSmarty is a template engine for PHP. Smarty contains a cross-site scripting vulnerability when displaying an error message.\r\n\r\nYuji Tounai of bogus.jp reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000094.html",
  "sec:cpe": {
    "#text": "cpe:/a:smarty:smarty",
    "@product": "Smarty",
    "@vendor": "Smarty",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "4.3",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2012-000094",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN63650108/index.html",
      "@id": "JVN#63650108",
      "@source": "JVN"
    },
    {
      "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4437",
      "@id": "CVE-2012-4437",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-4437",
      "@id": "CVE-2012-4437",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-79",
      "@title": "Cross-site Scripting(CWE-79)"
    }
  ],
  "title": "Smarty vulnerable to cross-site scripting"
}