Vulnerability Description
The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Smarty | Smarty | >= 3.0.0, < 3.0.7 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/security/cve/cve-2011-1028Broken Link
- https://seclists.org/oss-sec/2011/q1/313Mailing ListThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2011-1028Third Party Advisory
- https://access.redhat.com/security/cve/cve-2011-1028Broken Link
- https://seclists.org/oss-sec/2011/q1/313Mailing ListThird Party Advisory
- https://security-tracker.debian.org/tracker/CVE-2011-1028Third Party Advisory
FAQ
What is CVE-2011-1028?
CVE-2011-1028 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.
How severe is CVE-2011-1028?
CVE-2011-1028 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2011-1028?
Check the references section above for vendor advisories and patch information. Affected products include: Smarty Smarty, Debian Debian Linux.