Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-4811

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2008-4811
Last Modified 01 Jul 2009 11:25:08
Published 31 Oct 2008 02:09:08
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2008-4811

Summary

The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.

Vulnerable Systems

Application

  • Smarty 1.0

  • Smarty 1.0a

  • Smarty 1.0b

  • Smarty 1.1.0

  • Smarty 1.2.0

  • Smarty 1.2.1

  • Smarty 1.2.2

  • Smarty 1.3.0

  • Smarty 1.3.1

  • Smarty 1.3.2

  • Smarty 1.4.0

  • Smarty 1.4.1

  • Smarty 1.4.2

  • Smarty 1.4.3

  • Smarty 1.4.4

  • Smarty 1.4.5

  • Smarty 1.4.6

  • Smarty 1.5.0

  • Smarty 1.5.1

  • Smarty 1.5.2

  • Smarty 2.0.0

  • Smarty 2.0.1

  • Smarty 2.1.0

  • Smarty 2.1.1

  • Smarty 2.2.0

  • Smarty 2.3.0

  • Smarty 2.3.1

  • Smarty 2.4.0

  • Smarty 2.4.1

  • Smarty 2.4.2

  • Smarty 2.5.0

  • Smarty 2.6.0

  • Smarty 2.6.1

  • Smarty 2.6.10

  • Smarty 2.6.11

  • Smarty 2.6.12

  • Smarty 2.6.13

  • Smarty 2.6.14

  • Smarty 2.6.15

  • Smarty 2.6.16

  • Smarty 2.6.17

  • Smarty 2.6.18

  • Smarty 2.6.2

  • Smarty 2.6.3

  • Smarty 2.6.4

  • Smarty 2.6.5

  • Smarty 2.6.6

  • Smarty 2.6.7

  • Smarty 2.6.9


References

XF - smarty-expandquotedtext-code-execution1(46406)

BID - 31862

MLIST - [oss-security] 20081025 Regarding SA32329 (Smarty "_expand_quoted_text()" Security Bypass)

DEBIAN - DSA-1691

MISC - http://securityvulns.ru/Udocument746.html

SECUNIA - 32329


Last Updated: 27 May 2016 10:48:38