This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Smarty First view 2008-02-28
Product Smarty Last view 2022-09-15
Version 1.3.0 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:smarty:smarty

Activity : Overall

Related : CVE

  Date Alert Description
5.4 2022-09-15 CVE-2018-25047

In Smarty before 3.1.47 and 4.x before 4.2.1, libs/plugins/function.mailto.php allows XSS. A web page that uses smarty_function_mailto, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.

8.8 2022-05-24 CVE-2022-29221

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.

8.8 2022-01-10 CVE-2021-29454

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.42 and 4.0.2, template authors could run arbitrary PHP code by crafting a malicious math string. If a math string was passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. Users should upgrade to version 3.1.42 or 4.0.2 to receive a patch.

8.8 2022-01-10 CVE-2021-21408

Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.43 and 4.0.3, template authors could run restricted static php methods. Users should upgrade to version 3.1.43 or 4.0.3 to receive a patch.

9.8 2021-02-22 CVE-2021-26120

Smarty before 3.1.39 allows code injection via an unexpected function name after a {function name= substring.

7.5 2021-02-22 CVE-2021-26119

Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.

9.8 2019-11-20 CVE-2011-1028

The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.

7.5 2018-09-18 CVE-2018-13982

Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.

5.9 2018-09-11 CVE-2018-16831

Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.

9.8 2018-01-03 CVE-2017-1000480

Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.

7.5 2014-11-03 CVE-2014-8350

Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

4.3 2012-09-30 CVE-2012-4437

Cross-site scripting (XSS) vulnerability in the SmartyException class in Smarty (aka smarty-php) before 3.1.12 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors that trigger a Smarty exception.

4.3 2012-08-13 CVE-2012-4277

Cross-site scripting (XSS) vulnerability in the smarty_function_html_options_optoutput function in distribution/libs/plugins/function.html_options.php in Smarty before 3.1.8 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

10 2011-02-03 CVE-2010-4727

Smarty before 3.0.0 beta 7 does not properly handle the tags, which has unspecified impact and remote attack vectors.

10 2011-02-03 CVE-2010-4726

Unspecified vulnerability in the math plugin in Smarty before 3.0.0 RC1 has unknown impact and remote attack vectors. NOTE: this might overlap CVE-2009-1669.

10 2011-02-03 CVE-2010-4725

Smarty before 3.0.0 RC3 does not properly handle an on value of the asp_tags option in the php.ini file, which has unspecified impact and remote attack vectors.

10 2011-02-03 CVE-2010-4724

Multiple unspecified vulnerabilities in the parser implementation in Smarty before 3.0.0 RC3 have unknown impact and remote attack vectors.

9.3 2011-02-03 CVE-2010-4723

Smarty before 3.0.0, when security is enabled, does not prevent access to the (1) dynamic and (2) private object members of an assigned object, which has unspecified impact and remote attack vectors.

10 2011-02-03 CVE-2010-4722

Unspecified vulnerability in the fetch plugin in Smarty before 3.0.2 has unknown impact and remote attack vectors.

7.5 2011-02-03 CVE-2009-5054

Smarty before 3.0.0 beta 4 does not consider the umask value when setting the permissions of files, which might allow attackers to bypass intended access restrictions via standard filesystem operations.

7.5 2011-02-03 CVE-2009-5053

Unspecified vulnerability in Smarty before 3.0.0 beta 6 allows remote attackers to execute arbitrary PHP code by injecting this code into a cache file.

10 2011-02-03 CVE-2009-5052

Multiple unspecified vulnerabilities in Smarty before 3.0.0 beta 6 have unknown impact and attack vectors.

7.5 2008-10-31 CVE-2008-4811

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.

7.5 2008-10-31 CVE-2008-4810

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions.

7.5 2008-02-28 CVE-2008-1066

The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.

CWE : Common Weakness Enumeration

%idName
27% (5) CWE-94 Failure to Control Generation of Code ('Code Injection')
22% (4) CWE-20 Improper Input Validation
16% (3) CWE-264 Permissions, Privileges, and Access Controls
16% (3) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
11% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
5% (1) CWE-74 Failure to Sanitize Data into a Different Plane ('Injection')

Open Source Vulnerability Database (OSVDB)

id Description
70797 Smarty Multiple Tag Handling Unspecified Remote Issue
70796 Smarty Math Plugin Unspecified Remote Issue
70795 Smarty php.ini asp_tags Option Value Handling Weakness Unspecified Remote Issue
70794 Smarty Parser Multiple Unspecified Issues
70793 Smarty Dynamic / Private Object Member Access Restriction Weakness
70792 Smarty Fetch Plugin Unspecified Issue
70791 Smarty File Permissions umask Standard Filesystem Operations Access Restricti...
70790 Smarty Unspecified Cache File Arbitrary PHP Code Execution
70789 Smarty Multiple Unspecified Issues
49943 Smarty libs/Smarty_Compiler.class.php _expand_quoted_text() Function Arbitrar...
43064 Smarty modifier.regex_replace.php Plugin Search String Arbitrary PHP Code Exe...

OpenVAS Exploits

id Description
2012-02-12 Name : Gentoo Security Advisory GLSA 201111-04 (PhpDocumentor)
File : nvt/glsa_201111_04.nasl
2011-03-09 Name : Gentoo Security Advisory GLSA 201006-13 (smarty)
File : nvt/glsa_201006_13.nasl
2010-08-21 Name : Debian Security Advisory DSA 1919-2 (smarty)
File : nvt/deb_1919_2.nasl
2009-10-27 Name : Debian Security Advisory DSA 1919-1 (smarty)
File : nvt/deb_1919_1.nasl
2009-06-30 Name : Ubuntu USN-791-1 (moodle)
File : nvt/ubuntu_791_1.nasl
2009-06-05 Name : Ubuntu USN-723-1 (git-core)
File : nvt/ubuntu_723_1.nasl
2009-06-05 Name : Ubuntu USN-698-1 (nagios)
File : nvt/ubuntu_698_1.nasl
2009-03-02 Name : Mandrake Security Advisory MDVSA-2009:052 (php-smarty)
File : nvt/mdksa_2009_052.nasl
2009-02-17 Name : Fedora Update for php-Smarty FEDORA-2008-9420
File : nvt/gb_fedora_2008_9420_php-Smarty_fc9.nasl
2009-02-17 Name : Fedora Update for php-Smarty FEDORA-2008-9401
File : nvt/gb_fedora_2008_9401_php-Smarty_fc8.nasl
2009-02-16 Name : Fedora Update for php-pear-PhpDocumentor FEDORA-2008-2656
File : nvt/gb_fedora_2008_2656_php-pear-PhpDocumentor_fc8.nasl
2009-02-16 Name : Fedora Update for gallery2 FEDORA-2008-2650
File : nvt/gb_fedora_2008_2650_gallery2_fc8.nasl
2009-02-16 Name : Fedora Update for gallery2 FEDORA-2008-2587
File : nvt/gb_fedora_2008_2587_gallery2_fc7.nasl
2009-02-16 Name : Fedora Update for php-Smarty FEDORA-2008-10409
File : nvt/gb_fedora_2008_10409_php-Smarty_fc10.nasl
2008-12-29 Name : Ubuntu USN-698-2 (nagios3)
File : nvt/ubuntu_698_2.nasl
2008-12-29 Name : Ubuntu USN-699-1 (blender)
File : nvt/ubuntu_699_1.nasl
2008-12-29 Name : Debian Security Advisory DSA 1691-1 (moodle)
File : nvt/deb_1691_1.nasl
2008-03-19 Name : Debian Security Advisory DSA 1520-1 (smarty)
File : nvt/deb_1520_1.nasl

Nessus® Vulnerability Scanner

id Description
2018-01-23 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4094.nasl - Type: ACT_GATHER_INFO
2018-01-22 Name: The remote Debian host is missing a security update.
File: debian_DLA-1249.nasl - Type: ACT_GATHER_INFO
2016-05-04 Name: The remote Debian host is missing a security update.
File: debian_DLA-452.nasl - Type: ACT_GATHER_INFO
2014-11-24 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2014-221.nasl - Type: ACT_GATHER_INFO
2014-11-10 Name: The remote Fedora host is missing a security update.
File: fedora_2014-13618.nasl - Type: ACT_GATHER_INFO
2014-11-05 Name: The remote Fedora host is missing a security update.
File: fedora_2014-13574.nasl - Type: ACT_GATHER_INFO
2014-11-05 Name: The remote Fedora host is missing a security update.
File: fedora_2014-13570.nasl - Type: ACT_GATHER_INFO
2012-09-26 Name: The remote Fedora host is missing a security update.
File: fedora_2012-14578.nasl - Type: ACT_GATHER_INFO
2011-11-14 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201111-04.nasl - Type: ACT_GATHER_INFO
2010-06-03 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201006-13.nasl - Type: ACT_GATHER_INFO
2010-02-24 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-1919.nasl - Type: ACT_GATHER_INFO
2009-06-25 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-791-1.nasl - Type: ACT_GATHER_INFO
2009-04-23 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2009-052.nasl - Type: ACT_GATHER_INFO
2009-04-23 Name: The remote Fedora host is missing a security update.
File: fedora_2008-10409.nasl - Type: ACT_GATHER_INFO
2008-12-22 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-1691.nasl - Type: ACT_GATHER_INFO
2008-11-07 Name: The remote Fedora host is missing a security update.
File: fedora_2008-9420.nasl - Type: ACT_GATHER_INFO
2008-11-07 Name: The remote Fedora host is missing a security update.
File: fedora_2008-9401.nasl - Type: ACT_GATHER_INFO
2008-04-18 Name: The remote Fedora host is missing a security update.
File: fedora_2008-2650.nasl - Type: ACT_GATHER_INFO
2008-04-18 Name: The remote Fedora host is missing a security update.
File: fedora_2008-2587.nasl - Type: ACT_GATHER_INFO
2008-03-28 Name: The remote Fedora host is missing a security update.
File: fedora_2008-2656.nasl - Type: ACT_GATHER_INFO
2008-03-21 Name: The remote openSUSE host is missing a security update.
File: suse_moodle-5109.nasl - Type: ACT_GATHER_INFO
2008-03-17 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-1520.nasl - Type: ACT_GATHER_INFO