Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-4811

Опубликовано: 31 окт. 2008
Источник: debian
EPSS Низкий

Описание

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
smartyfixed2.6.26-0.1package
smartyno-dsalennypackage
smartyno-dsaetchpackage
moodlefixed1.8.2-2package
gallery2fixed2.2.5-2package

Примечания

  • This attack vector is *not* fixed in r2797

EPSS

Процентиль: 77%
0.01003
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.

nvd
больше 17 лет назад

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.

github
больше 3 лет назад

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.

EPSS

Процентиль: 77%
0.01003
Низкий