First published: Thu Apr 12 2007(Updated: )
** DISPUTED ** PHP remote file inclusion vulnerability in unit_test/test_cases.php in Smarty 2.6.1 allows remote attackers to execute arbitrary PHP code via a URL in the SMARTY_DIR parameter. NOTE: this issue is disputed by CVE and a third party because SMARTY_DIR is a constant.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Smarty | =2.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-7193 is disputed, but it is classified as a remote file inclusion vulnerability that could potentially allow execution of arbitrary PHP code.
To fix CVE-2006-7193, ensure that you do not use untrusted input for the SMARTY_DIR parameter and consider updating to a more secure version of Smarty.
CVE-2006-7193 affects Smarty version 2.6.1.
CVE-2006-7193 is a disputed vulnerability, with some sources arguing that SMARTY_DIR is a constant and not exploitable.
An attacker may exploit CVE-2006-7193 to include remote files and execute arbitrary PHP code on the server.