Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-35226
HistoryMay 28, 2024 - 8:55 p.m.

CVE-2024-35226 PHP Code Injection by malicious attribute in extends-tag in Smarty

2024-05-2820:55:00
CWE-94
GitHub_M
www.cve.org
1
cve-2024-35226
php
code injection
smarty
template engine
security vulnerability
update
malicious attribute

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

0.0004 Low

EPSS

Percentile

9.1%

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. In affected versions template authors could inject php code by choosing a malicious file name for an extends-tag. Sites that cannot fully trust template authors should update asap. All users are advised to update. There is no patch for users on the v3 branch. There are no known workarounds for this vulnerability.

CNA Affected

[
  {
    "vendor": "smarty-php",
    "product": "smarty",
    "versions": [
      {
        "version": ">= 5.0.0, < 5.1.1",
        "status": "affected"
      },
      {
        "version": ">= 3.0.0, < 4.5.3",
        "status": "affected"
      }
    ]
  }
]

7.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

0.0004 Low

EPSS

Percentile

9.1%

Related for CVELIST:CVE-2024-35226