Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.
{ "binaries": [ { "binary_name": "smarty3", "binary_version": "3.1.31+20161214.1.c7d42e4+selfpack1-3ubuntu0.1" } ], "availability": "No subscription required" }