First published: Thu Mar 27 2025(Updated: )
It was discovered that Smarty did not properly sanitize template file names. An attacker could possibly use this issue to cause Smarty to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/smarty4 | <4.3.1-1ubuntu0.24.10.1 | 4.3.1-1ubuntu0.24.10.1 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/smarty4 | <4.3.1-1ubuntu0.24.04.1 | 4.3.1-1ubuntu0.24.04.1 |
Ubuntu | =24.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7377-1 is high, as it can lead to denial of service or remote code execution.
To fix USN-7377-1, upgrade Smarty to version 4.3.1-1ubuntu0.24.10.1 on Ubuntu 24.10 or 4.3.1-1ubuntu0.24.04.1~esm1 on Ubuntu 24.04.
USN-7377-1 addresses an issue where Smarty did not properly sanitize template file names, potentially leading to crashes or arbitrary code execution.
USN-7377-1 affects Smarty versions prior to 4.3.1-1ubuntu0.24.10.1 on Ubuntu 24.10 and 4.3.1-1ubuntu0.24.04.1~esm1 on Ubuntu 24.04.
The vulnerability behind USN-7377-1 was discovered by a security researcher who found that Smarty had insufficient sanitization of template file names.