Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-452-1 smarty3 security update
EUVD EUVD EUVD-2022-2026 Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.
Github GHSA Github GHSA GHSA-2pmx-6mm6-6v72 Smarty arbitrary PHP code execution
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: debian

Published:

Updated: 2024-08-06T13:18:48.203Z

Reserved: 2014-10-20T00:00:00

Link: CVE-2014-8350

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-11-03T16:55:08.010

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-8350

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses