First published: Wed Nov 20 2019(Updated: )
The `$smarty.template` variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the `sysplugins/smarty_internal_compile_private_special_variable.php` file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/smarty/smarty | <3.0.7 | 3.0.7 |
debian/smarty3 | 3.1.39-2+deb11u1 3.1.47-2 3.1.48-1 | |
Smarty | >=3.0.0<3.0.7 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1028 has been classified with high severity due to the potential for arbitrary PHP code execution.
To fix CVE-2011-1028, update Smarty to version 3.0.7 or later.
CVE-2011-1028 affects Smarty versions prior to 3.0.7 and specific Debian Linux versions including 8.0, 9.0, and 10.0.
The impact of CVE-2011-1028 allows attackers to execute arbitrary PHP code, leading to potential system compromise.
As a temporary workaround for CVE-2011-1028, avoid using the vulnerable $smarty.template variable until you can apply the fix.