First published: Wed Nov 20 2019(Updated: )
The `$smarty.template` variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the `sysplugins/smarty_internal_compile_private_special_variable.php` file.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Smarty Smarty | >=3.0.0<3.0.7 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
composer/smarty/smarty | <3.0.7 | 3.0.7 |
debian/smarty3 | 3.1.39-2+deb11u1 3.1.47-2 3.1.48-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.