Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-8350

Опубликовано: 03 нояб. 2014
Источник: debian

Описание

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
smarty3fixed3.1.21-1package
smarty3end-of-lifesqueezepackage
smartynot-affectedpackage

Примечания

  • https://github.com/smarty-php/smarty/commit/279bdbd3521cd717cae6a3ba48f1c3c6823f439d.patch

Связанные уязвимости

ubuntu
больше 11 лет назад

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

nvd
больше 11 лет назад

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

github
больше 3 лет назад

Smarty arbitrary PHP code execution