[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-8350Date: (C)2014-11-07   (M)2023-12-22


Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
BID-70708
MDVSA-2014:221
http://seclists.org/oss-sec/2014/q4/420
http://seclists.org/oss-sec/2014/q4/421
http://advisories.mageia.org/MGASA-2014-0468.html
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920
https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902
smarty-cve20148350-code-exec(97725)

CPE    91
cpe:/a:smarty:smarty:1.2.2
cpe:/a:smarty:smarty:1.2.1
cpe:/a:smarty:smarty:1.2.0
cpe:/a:smarty:smarty:1.0
...
CWE    1
CWE-94
OVAL    2
oval:org.secpod.oval:def:107877
oval:org.secpod.oval:def:107871

© SecPod Technologies