[smarty] [CVE-2008-1066] arbitrary code execution
Bug #203457 reported by
disabled.user
This bug report is a duplicate of:
Bug #202422: CVE-2008-1066 smarty allows attackers to call arbitrary PHP functions via templates.
Edit
Remove
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
smarty (Debian) |
Fix Released
|
Unknown
|
|||
smarty (Ubuntu) |
New
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: smarty
References:
DSA-1520-1 (http://
Quoting:
"It was discovered that the regex module in Smarty, a PHP templating engine,
allows attackers to call arbitrary PHP functions via templates using the
regex_replace plugin by a specially crafted search string."
CVE References
Changed in smarty: | |
status: | Unknown → Fix Released |
To post a comment you must log in.