Vulnerability CVE-2009-1669


Published: 2009-05-18   Modified: 2012-02-13

Description:
The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information.

See advisories in our WLB2 database:
Topic
Author
Date
High
Bitweaver <= 2.6 saveFeed() Remote Code Execution Exploit
bookoo
20.05.2009

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Smarty -> Smarty 

 References:
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html
http://xforce.iss.net/xforce/xfdb/50457
http://www.ubuntu.com/usn/usn-791-3
http://www.securityfocus.com/bid/34918
http://www.milw0rm.com/exploits/8659
http://secunia.com/advisories/35219
http://secunia.com/advisories/35072
http://osvdb.org/54380

Copyright 2024, cxsecurity.com

 

Back to Top