Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-29454

Опубликовано: 10 янв. 2022
Источник: debian
EPSS Низкий

Описание

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
smarty4fixed4.1.1-1package
smarty3fixed3.1.45-1package

Примечания

  • https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m

  • https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71 (v4.0.2)

  • https://github.com/smarty-php/smarty/commit/7ad97ad030b4289711e30819c928b8bc33c62b23 (v3.1.42)

EPSS

Процентиль: 58%
0.00359
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 4 лет назад

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.

CVSS3: 8.1
nvd
около 4 лет назад

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.

CVSS3: 8.1
github
около 4 лет назад

Sandbox Escape by math function in smarty

CVSS3: 8.8
fstec
почти 5 лет назад

Уязвимость обработчика шаблонов для PHP Smarty, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный PHP-код

EPSS

Процентиль: 58%
0.00359
Низкий