Description
Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.
References (9)
Core 9
Core References
Patch, Vendor Advisory x_refsource_confirm
https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50
Patch, Vendor Advisory x_refsource_confirm
https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8
Patch, Vendor Advisory x_refsource_confirm
https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1
Patch, Vendor Advisory x_refsource_confirm
https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe
Patch, Vendor Advisory x_refsource_confirm
https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531
Exploit, Patch, Third Party Advisory x_refsource_misc
https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html
Scores
CVSS v3
7.5
EPSS
0.0233
EPSS Percentile
84.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-22
Status
published
Products (3)
debian/debian_linux
9.0
smarty/smarty
< 3.1.33
smarty/smarty
0 - 3.1.33Packagist
Published
Sep 18, 2018
Tracked Since
Feb 18, 2026