First published: Mon Jan 10 2022(Updated: )
### Impact Template authors could run restricted static php methods. ### Patches Please upgrade to 3.1.40 or higher. ### References See the [documentation on Smarty security features](https://www.smarty.net/docs/en/advanced.features.tpl#advanced.features.security) on the static_classes access filter. ### For more information If you have any questions or comments about this advisory please open an issue in [the Smarty repo](https://github.com/smarty-php/smarty)
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/smarty/smarty | <3.1.43>=4.0.0<4.0.3 | |
debian/smarty3 | 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u1 3.1.33+20180830.1.3a78a21f+selfpack1-1+deb10u2 3.1.39-2+deb11u1 3.1.47-2 3.1.48-1 | |
debian/smarty4 | 4.3.0-1+deb12u1 4.3.1-1 | |
composer/smarty/smarty | >=4.0.0<4.0.3 | 4.0.3 |
composer/smarty/smarty | <3.1.43 | 3.1.43 |
Smarty | <3.1.43 | |
Smarty | >=4.0.0<4.0.3 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
Debian Linux | =11.0 | |
Red Hat Fedora | =36 | |
Red Hat Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-21408 has been classified as a high-severity vulnerability due to its potential to allow unrestricted execution of static PHP methods.
To mitigate CVE-2021-21408, you should upgrade Smarty to version 3.1.40 or higher or 4.0.3.
CVE-2021-21408 affects versions of Smarty prior to 3.1.40 and those in the 4.0.0 to 4.0.3 range.
CVE-2021-21408 is a security vulnerability that allows template authors to execute restricted static PHP methods.
Detailed information about CVE-2021-21408 can typically be found in the security advisories issued by Smarty.