First published: Tue May 28 2024(Updated: )
### Impact Template authors could inject php code by choosing a malicous file name for an extends-tag. Users that cannot fully trust template authors should update asap. ### Patches Please upgrade to the most recent version of Smarty v4 or v5. There is no patch for v3.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/smarty/smarty | >=3.0.0<4.5.3 | 4.5.3 |
composer/smarty/smarty | >=5.0.0<5.1.1 | 5.1.1 |
debian/smarty3 | <=3.1.39-2+deb11u1<=3.1.47-2 | 3.1.39-2+deb11u2 3.1.47-2+deb12u1 3.1.48-2 |
debian/smarty4 | <=4.3.0-1+deb12u1 | 4.3.0-1+deb12u2 4.5.4-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.