Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://www.debian.org/security/2018/dsa-4094 | vendor advisory |
https://github.com/smarty-php/smarty/blob/master/change_log.txt | third party advisory release notes |
https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html | mailing list |
https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html | mailing list |