[Forgot Password]
Login  Register Subscribe

24003

 
 

131573

 
 

108741

 
 

909

 
 

85475

 
 

134

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2008-1066Date: (C)2008-02-28   (M)2018-02-19


The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 7.5
Exploit Score: Exploit Score: 10.0
Impact Score: Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: PARTIAL
Scope: Integrity: PARTIAL
Confidentiality: Availability: PARTIAL
Integrity:  
Availability:  
  
Reference:
BID-28105
SECUNIA-29241
SECUNIA-29392
SECUNIA-29398
SECUNIA-29405
SECUNIA-29562
SECUNIA-29839
DSA-1520
FEDORA-2008-2587
FEDORA-2008-2650
FEDORA-2008-2656
GLSA-201111-04
SUSE-SR:2008:007
http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html
http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652
http://www.smarty.net/misc/NEWS
smarty-modifierregexreplace-security-bypass(41002)

CPE    1
cpe:/a:smarty:smarty:2.6.18
CWE    1
CWE-20
OVAL    1
oval:org.mitre.oval:def:7776

© SecPod Technologies