Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-4810

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2008-4810
Last Modified 01 Jul 2009 11:25:08
Published 31 Oct 2008 02:09:08
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2008-4810

Summary

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions.

Vulnerable Systems

Application

  • Smarty 1.0

  • Smarty 1.0a

  • Smarty 1.0b

  • Smarty 1.1.0

  • Smarty 1.2.0

  • Smarty 1.2.1

  • Smarty 1.2.2

  • Smarty 1.3.0

  • Smarty 1.3.1

  • Smarty 1.3.2

  • Smarty 1.4.0

  • Smarty 1.4.1

  • Smarty 1.4.2

  • Smarty 1.4.3

  • Smarty 1.4.4

  • Smarty 1.4.5

  • Smarty 1.4.6

  • Smarty 1.5.0

  • Smarty 1.5.1

  • Smarty 1.5.2

  • Smarty 2.0.0

  • Smarty 2.0.1

  • Smarty 2.1.0

  • Smarty 2.1.1

  • Smarty 2.2.0

  • Smarty 2.3.0

  • Smarty 2.3.1

  • Smarty 2.4.0

  • Smarty 2.4.1

  • Smarty 2.4.2

  • Smarty 2.5.0

  • Smarty 2.6.0

  • Smarty 2.6.1

  • Smarty 2.6.10

  • Smarty 2.6.11

  • Smarty 2.6.12

  • Smarty 2.6.13

  • Smarty 2.6.14

  • Smarty 2.6.15

  • Smarty 2.6.16

  • Smarty 2.6.17

  • Smarty 2.6.18

  • Smarty 2.6.2

  • Smarty 2.6.3

  • Smarty 2.6.4

  • Smarty 2.6.5

  • Smarty 2.6.6

  • Smarty 2.6.7

  • Smarty 2.6.9


References

CONFIRM - https://bugs.gentoo.org/attachment.cgi?id=169804&action=view

XF - smarty-expandquotedtext-code-execution(46031)

BID - 31862

MLIST - [oss-security] 20081025 Regarding SA32329 (Smarty "_expand_quoted_text()" Security Bypass)

DEBIAN - DSA-1691

CONFIRM - http://smarty-php.googlecode.com/svn/trunk/NEWS

MISC - http://securityvulns.ru/Udocument746.html

SECUNIA - 32329

CONFIRM - http://code.google.com/p/smarty-php/source/detail?r=2784&path=/trunk/libs/Smarty_Compiler.class.php


Last Updated: 27 May 2016 10:48:38