Vulnerability Description
Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Smarty | Smarty | >= 3.0.0, < 3.1.32 |
Related Weaknesses (CWE)
References
- https://github.com/smarty-php/smarty/blob/master/change_log.txtRelease NotesThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html
- https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html
- https://www.debian.org/security/2018/dsa-4094
- https://github.com/smarty-php/smarty/blob/master/change_log.txtRelease NotesThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/01/msg00023.html
- https://lists.debian.org/debian-lts-announce/2018/02/msg00000.html
- https://www.debian.org/security/2018/dsa-4094
FAQ
What is CVE-2017-1000480?
CVE-2017-1000480 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Smarty 3 before 3.1.32 is vulnerable to a PHP code injection when calling fetch() or display() functions on custom resources that does not sanitize template name.
How severe is CVE-2017-1000480?
CVE-2017-1000480 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-1000480?
Check the references section above for vendor advisories and patch information. Affected products include: Smarty Smarty.