First published: Wed Jan 03 2018(Updated: )
Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/smarty3 | 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u1 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2 3.1.39-2+deb11u1 3.1.47-2 3.1.48-1 | |
composer/smarty/smarty | >=3<3.1.32 | 3.1.32 |
Smarty | >=3.0.0<3.1.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000480 is classified as a critical vulnerability due to the potential for PHP code injection.
Users of Smarty 3 prior to version 3.1.32 are at risk of unauthorized PHP code execution when using fetch() or display() functions.
To mitigate CVE-2017-1000480, upgrade Smarty to versions 3.1.33 or later.
Smarty versions before 3.1.32 are vulnerable to CVE-2017-1000480.
It is recommended to sanitize template names when calling fetch() or display() functions to help mitigate the risk if an upgrade is not possible.