[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78764

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-1066

Date: (C)2008-02-28   (M)2017-11-18 


The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.

CVSS Score: 7.5Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL





Reference:
BID-28105
SECUNIA-29241
SECUNIA-29392
SECUNIA-29398
SECUNIA-29405
SECUNIA-29562
SECUNIA-29839
DSA-1520
FEDORA-2008-2587
FEDORA-2008-2650
FEDORA-2008-2656
GLSA-201111-04
SUSE-SR:2008:007
http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html
http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652
http://www.smarty.net/misc/NEWS
smarty-modifierregexreplace-security-bypass(41002)

CPE    1
cpe:/a:smarty:smarty:2.6.18
CWE    1
CWE-20
OVAL    1
oval:org.mitre.oval:def:7776

© 2013 SecPod Technologies