Vulnerability Description
Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Smarty | Smarty | < 3.1.33 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_SExploitPatchThird Party Advisory
- https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac6265PatchVendor Advisory
- https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc5PatchVendor Advisory
- https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a24058PatchVendor Advisory
- https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f61PatchVendor Advisory
- https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f00PatchVendor Advisory
- https://lists.debian.org/debian-lts-announce/2021/04/msg00004.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2021/04/msg00014.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2021/10/msg00015.htmlMailing ListThird Party Advisory
- https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180420-01_SExploitPatchThird Party Advisory
- https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac6265PatchVendor Advisory
- https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc5PatchVendor Advisory
- https://github.com/smarty-php/smarty/commit/bcedfd6b58bed4a7366336979ebaa5a24058PatchVendor Advisory
- https://github.com/smarty-php/smarty/commit/c9dbe1d08c081912d02bd851d1d1b6388f61PatchVendor Advisory
- https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f00PatchVendor Advisory
FAQ
What is CVE-2018-13982?
CVE-2018-13982 is a vulnerability with a CVSS score of 7.5 (HIGH). Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the execute...
How severe is CVE-2018-13982?
CVE-2018-13982 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-13982?
Check the references section above for vendor advisories and patch information. Affected products include: Smarty Smarty, Debian Debian Linux.