First published: Tue Mar 29 2005(Updated: )
Unknown vulnerability in the regex_replace modifier (modifier.regex_replace.php) in Smarty before 2.6.8 allows attackers to execute arbitrary PHP code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Smarty | =2.6.2 | |
Smarty | =2.6.3 | |
Smarty | =2.6.4 | |
Smarty | =2.6.5 | |
Smarty | =2.6.6 | |
Smarty | =2.6.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0913 is considered to have a critical severity level due to the potential for arbitrary PHP code execution.
To fix CVE-2005-0913, upgrade Smarty to version 2.6.8 or later.
CVE-2005-0913 affects Smarty versions 2.6.2 to 2.6.7.
Yes, exploiting CVE-2005-0913 can potentially lead to data compromise by allowing attackers to execute arbitrary PHP code.
While CVE-2005-0913 is an older vulnerability, it is still relevant for systems that have not been updated to the patched version of Smarty.