Vulnerability Description
Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.
CVSS Score
5.9
MEDIUM
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Smarty | Smarty | >= 3.0.0, <= 3.1.32 |
Related Weaknesses (CWE)
References
- https://github.com/smarty-php/smarty/issues/486ExploitThird Party Advisory
- https://github.com/smarty-php/smarty/issues/486ExploitThird Party Advisory
FAQ
What is CVE-2018-16831?
CVE-2018-16831 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.
How severe is CVE-2018-16831?
CVE-2018-16831 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16831?
Check the references section above for vendor advisories and patch information. Affected products include: Smarty Smarty.