CVE-2018-13982

Source
https://nvd.nist.gov/vuln/detail/CVE-2018-13982
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-13982.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-13982
Aliases
Related
Published
2018-09-18T21:29:02Z
Modified
2024-11-23T05:50:43.189384Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.

References

Affected packages

Debian:11 / smarty3

Package

Name
smarty3
Purl
pkg:deb/debian/smarty3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.33+20180830.1.3a78a21f+selfpack1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / smarty3

Package

Name
smarty3
Purl
pkg:deb/debian/smarty3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.33+20180830.1.3a78a21f+selfpack1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / smarty3

Package

Name
smarty3
Purl
pkg:deb/debian/smarty3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.33+20180830.1.3a78a21f+selfpack1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/smarty-php/smarty

Affected ranges

Type
GIT
Repo
https://github.com/smarty-php/smarty
Events

Affected versions

v2.*

v2.6.24
v2.6.25
v2.6.26
v2.6.27
v2.6.28

v3.*

v3.1.11
v3.1.12
v3.1.13
v3.1.14
v3.1.15
v3.1.16
v3.1.17
v3.1.18
v3.1.19
v3.1.20
v3.1.21
v3.1.23
v3.1.24
v3.1.25
v3.1.26
v3.1.27
v3.1.28
v3.1.29
v3.1.30
v3.1.31
v3.1.32