Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../
substring in an include statement.
{ "nvd_published_at": "2018-09-11T13:29:00Z", "cwe_ids": [ "CWE-22" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2023-07-25T19:37:36Z" }