fkie_cve-2014-8350
Vulnerability from fkie_nvd
Published
2014-11-03 16:55
Modified
2024-11-21 02:18
Severity ?
Summary
Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.
Impacted products
Vendor Product Version
smarty smarty *
smarty smarty 1.0
smarty smarty 1.0a
smarty smarty 1.0b
smarty smarty 1.1.0
smarty smarty 1.2.0
smarty smarty 1.2.1
smarty smarty 1.2.2
smarty smarty 1.3.0
smarty smarty 1.3.1
smarty smarty 1.3.2
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.0
smarty smarty 1.4.1
smarty smarty 1.4.2
smarty smarty 1.4.3
smarty smarty 1.4.4
smarty smarty 1.4.5
smarty smarty 1.4.6
smarty smarty 1.5.0
smarty smarty 1.5.1
smarty smarty 1.5.2
smarty smarty 2.0.0
smarty smarty 2.0.1
smarty smarty 2.1.0
smarty smarty 2.1.1
smarty smarty 2.2.0
smarty smarty 2.3.0
smarty smarty 2.3.1
smarty smarty 2.4.0
smarty smarty 2.4.1
smarty smarty 2.4.2
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.5.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.0
smarty smarty 2.6.1
smarty smarty 2.6.2
smarty smarty 2.6.3
smarty smarty 2.6.4
smarty smarty 2.6.5
smarty smarty 2.6.6
smarty smarty 2.6.7
smarty smarty 2.6.9
smarty smarty 2.6.10
smarty smarty 2.6.11
smarty smarty 2.6.12
smarty smarty 2.6.13
smarty smarty 2.6.14
smarty smarty 2.6.15
smarty smarty 2.6.16
smarty smarty 2.6.17
smarty smarty 2.6.18
smarty smarty 2.6.20
smarty smarty 2.6.22
smarty smarty 2.6.24
smarty smarty 2.6.25
smarty smarty 2.6.26
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.0
smarty smarty 3.0.1
smarty smarty 3.0.2
smarty smarty 3.0.3
smarty smarty 3.0.4
smarty smarty 3.0.5
smarty smarty 3.0.6
smarty smarty 3.0.7
smarty smarty 3.1
smarty smarty 3.1.0
smarty smarty 3.1.1
smarty smarty 3.1.2
smarty smarty 3.1.3
smarty smarty 3.1.4
smarty smarty 3.1.5
smarty smarty 3.1.6
smarty smarty 3.1.7
smarty smarty 3.1.8
smarty smarty 3.1.9
smarty smarty 3.1.10
smarty smarty 3.1.11
smarty smarty 3.1.12
smarty smarty 3.1.13
smarty smarty 3.1.14
smarty smarty 3.1.15
smarty smarty 3.1.16
smarty smarty 3.1.17
smarty smarty 3.1.18
smarty smarty 3.1.19



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "996AF6BF-920D-4A80-83C9-A367B7024537",
              "versionEndIncluding": "3.1.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5FB053C-A0E3-49AF-ADF6-06A268B63061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "20D6D0EB-C680-479C-867A-13A90408E3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83A1128-0AE1-41F4-A836-67F16CD65DD0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A8EB346-D9D3-4EDC-A2BC-C08FE1B72183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C647DEF-268B-4259-9C06-A802C6688AC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D59EC271-7B08-4058-85EA-5C5B68915BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F786C297-9711-4753-AE70-F1EC8F3DC36C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "64819A4D-5F8C-4FFF-92DD-BBFA53840043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B07FF05-D669-4323-B987-F8D33CF41CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6DEB456-742C-42A1-B96D-604ADFFB30B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACD5727-71A3-4CFE-8F66-246B1BA378A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "8E7033B8-8298-497B-ADD2-4A3E73205EF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "AC146CA8-F777-43A8-850B-85DBCB1A1E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB4902CC-B3BE-4C5F-9550-F33E8DBE94EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA9CF5-BB3D-47FD-91F2-24AE73388B23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3638BE10-DA43-4821-92ED-A60FF38AEB5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE038A6-11B7-4A33-A5F6-864331C72828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "44EAF434-A6A7-460D-B138-A7DBE27963AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E76D49D2-4D30-475D-848E-C5D7986A18CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13B482E-D2CF-4EE7-A4BC-0E866051D6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E029B3-0375-4300-AB75-7FF25ABEC03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5289CD34-B0C5-4421-AF45-F121D1BC05A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A405A14-0B55-4EA7-8F14-55AD784D6618",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "406D30AC-2746-4C9A-A886-6B9946C503B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3690F3-EEC9-4D00-B5C6-EBAFA7983E0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C62C2F-702C-4D6B-BA9B-36C3A84C5029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D459162-8F88-4187-B683-7A873CFED17A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8575FCF2-8F3B-4274-8201-D51A50C55ED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DD77B1-E9BE-4386-9986-B733D9D41A09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B488FCA5-B5CA-49D7-AE78-AB5DC0039CE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BCB54B1-99D8-4D4C-BCD5-47A34AB7540B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "979E2B4D-CDB8-41AB-AC83-476BF0858E04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "457C0F14-9FD1-4BEE-87BB-CDAE861592B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "36394FA5-1E04-4C06-A36D-2A661AED7BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.5.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "644F6E4E-2B11-436F-A3A1-60042A7631D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1F93CC1-7BD4-4006-BF13-3A044CF917ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "0C344438-31E7-4180-9FE4-A0C575BA3CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "249A2041-C515-4072-8091-32E65A1F42A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "243A99DD-A54E-4D96-BF67-5853CE2FC5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "18214825-9B27-4DF1-A715-C1B825450070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D805C7-D9B9-4E3A-8A6A-0F4AD53AF0A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A5DCDA-32CC-4675-A1C1-E07AEFEE1491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "31588789-D836-44F4-AD3C-26A4E071B451",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D8E66D-8726-460C-A60D-6F2E534AA507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCDF3E7-441D-48E2-BA45-41E11AEB7458",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD88BE2-82D0-4122-95F3-B3DB85F5A31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7094A7-426F-44D6-AD97-97A10F46A3FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "560FF27F-4899-4139-80E6-C7F6E4FAAA15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "039BD24A-B097-44AF-A145-469AE27F3B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD4087E3-9EE0-4FDD-A822-973619B51FA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DB44614-3BBB-4F3F-8558-D2FE258E1CDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3488FA52-8180-42B8-9B36-EFB83051802E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB761B72-10D4-4E8F-8E2E-C0D9F1D07E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7458AC-3220-45B1-AA56-F7B82688105A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8AAAB3C-403D-4912-884A-4D258AA03698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE3397B-7AF2-418F-8A07-7CF9A9CA8558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "351FAC14-8538-480C-8A8D-4E3E422EB00D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B95000D-10A0-4D15-946E-24E432C6A464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA96BC2-78D3-4052-8AFA-F679E3FDF6A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF85AE00-A22D-4B57-B9BF-CDAF5B6B4B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:2.6.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5B9A3AD-53C7-4844-B01E-085906C54F77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F60BF56B-7165-456C-B7D1-AF6E869B7337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "DD3C622D-56F3-422B-AD47-A4256A22D127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "7C5F04CB-E990-49CF-97FD-ADE86C5BBC59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "947BF560-DA03-4688-A31B-F9FA3323113C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "F3E0F000-17CC-4240-B7A2-23D403856CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "D968667D-FB0C-4AE8-8275-959F7A96B2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B785A65E-3EB4-4E6E-8238-E1312D3692A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "53A4DCB2-AD64-4BD8-99AD-5D8AEB42240A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "A46B316A-0D93-4B17-AFF7-C52FFFF361FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "3DC9CDED-796C-4081-83DD-7AE59700FF39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AA427E6-AE83-4227-B45B-BD84569ACA2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C8DB2D9-9D3D-4F01-869F-AA5BEB2891DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE6E86E-623A-4136-9945-1E99629916B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A55A97A-FD19-4385-92D7-D511D53EE38C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F7BBD2A-45A1-4C98-9C73-DBBF2161BE29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB86C08-AE24-4B3C-90FE-917996A0A48C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DADDE896-B711-4ECD-B560-E9665B178173",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "293032B8-72CB-4201-901E-3A70613B7518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA2F1ACE-C3BD-4DEA-A317-38CD4928A781",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "469D55FF-5436-4000-8FF3-B3761761A429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "34C390AB-D6A6-4ABF-AA1E-A9294AC2FD70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "21D02454-647C-43B9-9DAC-A0306FB52F36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF0159CD-A5A9-4C7A-9EDC-9A6BC8740847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB73E7D4-A784-41EF-8DC8-3BF9245A549D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BD8A9C9-FFA8-46E8-874C-F5A31A785102",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE74F83B-33BB-4303-A022-51422BFBB8C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D780E5BB-4DC5-4E7C-A1B5-FE6E9E75B5D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CE55049-426E-4B43-8A55-A643B423A921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "88CDDA12-5690-442E-A893-47E9E2E60617",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D731309D-2418-4382-B565-E74C4593527F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C9A9770-5A48-45D8-A3E3-16867CED4B2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F9C2F03-33E0-4A2B-B363-68DC3337AF22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5346D673-2803-4F22-A66F-3398D0999816",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "05ECDD17-2C52-4C74-99C5-7047C56B6DCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E3A977F-9F73-401E-AD8E-A165F5BEE622",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "3718C076-3A47-46F6-A780-A4FF7FC03062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC520821-A9AA-47BB-A771-DFF0692A77C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:smarty:smarty:3.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C211F361-2A62-4D69-ADDA-657417657EFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by \"{literal}\u003c{/literal}script language=php\u003e\" in a template."
    },
    {
      "lang": "es",
      "value": "Smarty anterior a 3.1.21 permite a atacantes remotos evadir las restricciones del modo seguro y ejecutar c\u00f3digo PHP arbitrario tal y como fue demostrado por \u0027{literal}\u003c{/literal}script language=php\u003e\u0027 en una plantilla."
    }
  ],
  "id": "CVE-2014-8350",
  "lastModified": "2024-11-21T02:18:55.087",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-11-03T16:55:08.010",
  "references": [
    {
      "source": "security@debian.org",
      "url": "http://advisories.mageia.org/MGASA-2014-0468.html"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/oss-sec/2014/q4/420"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/oss-sec/2014/q4/421"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.securityfocus.com/bid/70708"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920"
    },
    {
      "source": "security@debian.org",
      "url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902"
    },
    {
      "source": "security@debian.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://advisories.mageia.org/MGASA-2014-0468.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/oss-sec/2014/q4/420"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/oss-sec/2014/q4/421"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/70708"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/97725"
    }
  ],
  "sourceIdentifier": "security@debian.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.