Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-452-1 | smarty3 security update |
EUVD |
EUVD-2022-2026 | Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template. |
Github GHSA |
GHSA-2pmx-6mm6-6v72 | Smarty arbitrary PHP code execution |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-06T13:18:48.203Z
Reserved: 2014-10-20T00:00:00
Link: CVE-2014-8350
No data.
Status : Deferred
Published: 2014-11-03T16:55:08.010
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-8350
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA