Описание
PHP Code Injection by malicious function name in smarty
Template authors could inject php code by choosing a malicous {function} name. Sites that cannot fully trust template authors should update as soon as possible. Please upgrade to 3.1.39 or higher.
Ссылки
- https://github.com/smarty-php/smarty/security/advisories/GHSA-3rpf-5rqv-689q
- https://nvd.nist.gov/vuln/detail/CVE-2021-26120
- https://github.com/smarty-php/smarty/commit/165f1bd4d2eec328cfeaca517a725b46001de838
- https://github.com/FriendsOfPHP/security-advisories/blob/master/smarty/smarty/CVE-2021-26120.yaml
- https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md
- https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md#3139---2021-02-17
- https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html
- https://security.gentoo.org/glsa/202105-06
- https://srcincite.io/blog/2021/02/18/smarty-template-engine-multiple-sandbox-escape-vulnerabilities.html
- https://www.debian.org/security/2022/dsa-5151
Пакеты
smarty/smarty
< 3.1.39
3.1.39
Связанные уязвимости
Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring.
Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring.
Smarty before 3.1.39 allows code injection via an unexpected function ...
Уязвимость обработчика шаблонов для PHP Smarty, связанная с неверным управлением генерацией кода при обработке недопустимых имен функций, позволяющая нарушителю выполнить произвольный код