First published: Thu Feb 28 2008(Updated: )
The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Smarty | <=2.6.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1066 has been classified as a high severity vulnerability due to its potential for code execution.
CVE-2008-1066 affects applications using the Smarty template engine version prior to 2.6.19, including those like Serendipity.
To fix CVE-2008-1066, upgrade Smarty to version 2.6.19 or later.
Attackers can exploit CVE-2008-1066 by injecting a '\0' character into a search string, allowing arbitrary PHP function calls.
To mitigate the risk of CVE-2008-1066, ensure that all templates are securely coded and sanitize user inputs to prevent injection.