Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2618-1 | smarty3 security update |
Debian DLA |
DLA-2618-2 | smarty3 regression update |
Debian DLA |
DLA-2618-3 | smarty3 regression update |
EUVD |
EUVD-2022-2995 | Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files. |
Github GHSA |
GHSA-7gfx-wxfh-7rvm | Smarty Path Traversal Vulnerability |
Ubuntu USN |
USN-5348-1 | Smarty vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T09:21:40.766Z
Reserved: 2018-07-11T00:00:00
Link: CVE-2018-13982
No data.
Status : Modified
Published: 2018-09-18T21:29:02.247
Modified: 2024-11-21T03:48:22.357
Link: CVE-2018-13982
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN