Lucene search

K
cve[email protected]CVE-2024-35226
HistoryMay 28, 2024 - 9:16 p.m.

CVE-2024-35226

2024-05-2821:16:30
CWE-94
web.nvd.nist.gov
34
cve-2024-35226
vulnerability
nvd

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. In affected versions template authors could inject php code by choosing a malicious file name for an extends-tag. Sites that cannot fully trust template authors should update asap. All users are advised to update. There is no patch for users on the v3 branch. There are no known workarounds for this vulnerability.

Affected configurations

Vulners
Node
smarty-phpsmartyRange5.0.05.1.1
OR
smarty-phpsmartyRange3.0.04.5.3

CNA Affected

[
  {
    "vendor": "smarty-php",
    "product": "smarty",
    "versions": [
      {
        "version": ">= 5.0.0, < 5.1.1",
        "status": "affected"
      },
      {
        "version": ">= 3.0.0, < 4.5.3",
        "status": "affected"
      }
    ]
  }
]

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%