[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2008-4810Date: (C)2008-10-31   (M)2023-12-22


The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
BID-31862
SECUNIA-32329
DSA-1691
http://www.openwall.com/lists/oss-security/2008/10/25/2
http://code.google.com/p/smarty-php/source/detail?r=2784&path=/trunk/libs/Smarty_Compiler.class.php
http://code.google.com/p/smarty-php/source/detail?r=2797&path=/trunk/libs/Smarty_Compiler.class.php
http://securityvulns.ru/Udocument746.html
http://smarty-php.googlecode.com/svn/trunk/NEWS
https://bugs.gentoo.org/attachment.cgi?id=169804&action=view
smarty-expandquotedtext-code-execution(46031)

CPE    56
cpe:/a:smarty:smarty:1.2.2
cpe:/a:smarty:smarty:1.4.0
cpe:/a:smarty:smarty:1.2.1
cpe:/a:smarty:smarty:1.2.0
...
CWE    1
CWE-94
OVAL    6
oval:org.mitre.oval:def:7939
oval:org.secpod.oval:def:700367
oval:org.secpod.oval:def:300866
oval:org.mitre.oval:def:7911
...

© SecPod Technologies