Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-35226
HistoryMay 28, 2024 - 8:55 p.m.

CVE-2024-35226 PHP Code Injection by malicious attribute in extends-tag in Smarty

2024-05-2820:55:00
CWE-94
GitHub_M
github.com
3
cve-2024-35226
php code injection
smarty
template engine
malicious attribute
extends-tag
application logic
update required
v3 branch

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

AI Score

7.2

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. In affected versions template authors could inject php code by choosing a malicious file name for an extends-tag. Sites that cannot fully trust template authors should update asap. All users are advised to update. There is no patch for users on the v3 branch. There are no known workarounds for this vulnerability.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:smarty-php:smarty:*:*:*:*:*:*:*:*"
    ],
    "vendor": "smarty-php",
    "product": "smarty",
    "versions": [
      {
        "status": "affected",
        "version": "5.0.0",
        "lessThan": "5.1.1",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "3.0.0",
        "lessThan": "4.5.3",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N

AI Score

7.2

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-35226