Vulnerability CVE-2014-8350


Published: 2014-11-03

Description:
Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Smarty -> Smarty 

 References:
http://advisories.mageia.org/MGASA-2014-0468.html
http://seclists.org/oss-sec/2014/q4/420
http://seclists.org/oss-sec/2014/q4/421
http://www.mandriva.com/security/advisories?name=MDVSA-2014:221
http://www.securityfocus.com/bid/70708
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765920
https://code.google.com/p/smarty-php/source/browse/trunk/distribution/change_log.txt?r=4902
https://exchange.xforce.ibmcloud.com/vulnerabilities/97725

Copyright 2024, cxsecurity.com

 

Back to Top