Smarty arbitrary PHP code execution
High severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Apr 24, 2024
Description
Published by the National Vulnerability Database
Nov 3, 2014
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Apr 24, 2024
Last updated
Apr 24, 2024
Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.
References