[Forgot Password]
Login  Register Subscribe

24002

 
 

127027

 
 

102010

 
 

909

 
 

81374

 
 

133

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2008-1066Date: (C)2008-02-28   (M)2018-02-19


The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score  : CVSS Score  : 7.5
Exploit Score: Exploit Score: 10.0
Impact Score : Impact Score : 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: LOW
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: PARTIAL
Scope: Integrity: PARTIAL
Confidentiality: Availability: PARTIAL
Integrity:  
Availability:  
  





Reference:
BID-28105
SECUNIA-29241
SECUNIA-29392
SECUNIA-29398
SECUNIA-29405
SECUNIA-29562
SECUNIA-29839
DSA-1520
FEDORA-2008-2587
FEDORA-2008-2650
FEDORA-2008-2656
GLSA-201111-04
SUSE-SR:2008:007
http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html
http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652
http://www.smarty.net/misc/NEWS
smarty-modifierregexreplace-security-bypass(41002)

CPE    1
cpe:/a:smarty:smarty:2.6.18
CWE    1
CWE-20
OVAL    1
oval:org.mitre.oval:def:7776

© 2013 SecPod Technologies