First published: Tue May 17 2022(Updated: )
Last updated 24 July 2024
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/smarty/smarty | <3.1.45>=4.0.0<4.1.1 | |
debian/smarty3 | 3.1.39-2+deb11u1 3.1.39-2+deb11u2 3.1.47-2+deb12u1 3.1.48-2 | |
debian/smarty4 | 4.3.0-1+deb12u2 4.5.4-1 | |
Smarty | <3.1.45 | |
Smarty | >=4.0.0<4.1.1 | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 | |
Fedora | =36 | |
Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29221 is considered a high severity vulnerability due to its potential for PHP code injection which can lead to arbitrary code execution.
To fix CVE-2022-29221, update Smarty to version 3.1.45 or 4.1.1 or later.
CVE-2022-29221 affects Smarty versions prior to 3.1.45 and between 4.0.0 and 4.1.1.
CVE-2022-29221 can facilitate PHP code injection attacks, allowing attackers to execute arbitrary PHP code on the server.
Yes, CVE-2022-29221 impacts several distributions including Debian and Fedora, particularly certain versions of Smarty.