GHSA-2pmx-6mm6-6v72

Suggest an improvement
Source
https://github.com/advisories/GHSA-2pmx-6mm6-6v72
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-2pmx-6mm6-6v72/GHSA-2pmx-6mm6-6v72.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2pmx-6mm6-6v72
Aliases
Published
2022-05-17T01:13:38Z
Modified
2024-12-06T05:48:06.054279Z
Summary
Smarty arbitrary PHP code execution
Details

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

Database specific
{
    "nvd_published_at": "2014-11-03T16:55:00Z",
    "cwe_ids": [
        "CWE-94"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-04-24T22:53:34Z"
}
References

Affected packages

Packagist / smarty/smarty

Package

Name
smarty/smarty
Purl
pkg:composer/smarty/smarty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.21

Affected versions

v2.*

v2.6.24
v2.6.25
v2.6.26
v2.6.27
v2.6.28
v2.6.29
v2.6.30
v2.6.31
v2.6.33

v3.*

v3.1.11
v3.1.12
v3.1.13
v3.1.14
v3.1.15
v3.1.16
v3.1.17
v3.1.18
v3.1.19
v3.1.20