[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-1066Date: (C)2008-02-28   (M)2023-12-22


The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '' character in a search string.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
BID-28105
SECUNIA-29241
SECUNIA-29392
SECUNIA-29398
SECUNIA-29405
SECUNIA-29562
SECUNIA-29839
DSA-1520
FEDORA-2008-2587
FEDORA-2008-2650
FEDORA-2008-2656
GLSA-201111-04
SUSE-SR:2008:007
http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html
http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652
http://www.smarty.net/misc/NEWS
smarty-modifierregexreplace-security-bypass(41002)

CWE    1
CWE-20
OVAL    1
oval:org.mitre.oval:def:7776

© SecPod Technologies