CVE-2021-29454

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-29454
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-29454.json
Aliases
Related
Published
2022-01-10T20:15:08Z
Modified
2023-11-29T08:45:45.297214Z
Details

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.

References

Affected packages

Git / github.com/smarty-php/smarty

Affected ranges

Type
GIT
Repo
https://github.com/smarty-php/smarty
Events

Affected versions

v4.*

v4.0.0
v4.0.1