Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50 | patch vendor advisory |
https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8 | patch vendor advisory |
https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f6133d1 | patch vendor advisory |
https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe | patch vendor advisory |
https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a240581531 | patch vendor advisory |
https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_Smarty_Path_Traversal | exploit third party advisory patch |
https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2021/10/msg00015.html | third party advisory mailing list |