Description
Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2618-1 | smarty3 security update |
Debian DLA |
DLA-2618-2 | smarty3 regression update |
Debian DLA |
DLA-2618-3 | smarty3 regression update |
EUVD |
EUVD-2022-2995 | Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files. |
Github GHSA |
GHSA-7gfx-wxfh-7rvm | Smarty Path Traversal Vulnerability |
Ubuntu USN |
USN-5348-1 | Smarty vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T09:21:40.766Z
Reserved: 2018-07-11T00:00:00.000Z
Link: CVE-2018-13982
No data.
Status : Modified
Published: 2018-09-18T21:29:02.247
Modified: 2024-11-21T03:48:22.357
Link: CVE-2018-13982
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA
Ubuntu USN