Lucene search

K
githubGitHub Advisory DatabaseGHSA-4RMG-292M-WG3W
HistoryMay 29, 2024 - 6:44 p.m.

Smarty vulnerable to PHP Code Injection by malicious attribute in extends-tag

2024-05-2918:44:30
CWE-94
GitHub Advisory Database
github.com
9
smarty
php
code injection
extends-tag
malicious file
template
update
version 4
version 5
patch

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

AI Score

7

Confidence

High

EPSS

0

Percentile

9.0%

Impact

Template authors could inject php code by choosing a malicous file name for an extends-tag. Users that cannot fully trust template authors should update asap.

Patches

Please upgrade to the most recent version of Smarty v4 or v5. There is no patch for v3.

Affected configurations

Vulners
Node
smartysmartyRange3.0.04.5.3
OR
smartysmartyRange5.0.05.1.1
VendorProductVersionCPE
smartysmarty*cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

AI Score

7

Confidence

High

EPSS

0

Percentile

9.0%