Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.
{ "binaries": [ { "binary_name": "smarty3", "binary_version": "3.1.21-1ubuntu1+esm1" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-1000480.json"
{ "binaries": [ { "binary_name": "smarty3", "binary_version": "3.1.31+20161214.1.c7d42e4+selfpack1-3" } ], "availability": "No subscription required" }