Vulnerability Details CVE-2018-13982
Smarty_Security::isTrustedResourceDir() in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.025
EPSS Ranking 84.8%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2018-13982
-
cpe:2.3:a:smarty:smarty:1.0
-
cpe:2.3:a:smarty:smarty:1.0a
-
cpe:2.3:a:smarty:smarty:1.0b
-
cpe:2.3:a:smarty:smarty:1.1.0
-
cpe:2.3:a:smarty:smarty:1.2.0
-
cpe:2.3:a:smarty:smarty:1.2.1
-
cpe:2.3:a:smarty:smarty:1.2.2
-
cpe:2.3:a:smarty:smarty:1.3.0
-
cpe:2.3:a:smarty:smarty:1.3.1
-
cpe:2.3:a:smarty:smarty:1.3.2
-
cpe:2.3:a:smarty:smarty:1.4.0
-
cpe:2.3:a:smarty:smarty:1.4.1
-
cpe:2.3:a:smarty:smarty:1.4.2
-
cpe:2.3:a:smarty:smarty:1.4.3
-
cpe:2.3:a:smarty:smarty:1.4.4
-
cpe:2.3:a:smarty:smarty:1.4.5
-
cpe:2.3:a:smarty:smarty:1.4.6
-
cpe:2.3:a:smarty:smarty:1.5.0
-
cpe:2.3:a:smarty:smarty:1.5.1
-
cpe:2.3:a:smarty:smarty:1.5.2
-
cpe:2.3:a:smarty:smarty:2.0.0
-
cpe:2.3:a:smarty:smarty:2.0.1
-
cpe:2.3:a:smarty:smarty:2.1.0
-
cpe:2.3:a:smarty:smarty:2.1.1
-
cpe:2.3:a:smarty:smarty:2.2.0
-
cpe:2.3:a:smarty:smarty:2.3.0
-
cpe:2.3:a:smarty:smarty:2.3.1
-
cpe:2.3:a:smarty:smarty:2.4.0
-
cpe:2.3:a:smarty:smarty:2.4.1
-
cpe:2.3:a:smarty:smarty:2.4.2
-
cpe:2.3:a:smarty:smarty:2.5.0
-
cpe:2.3:a:smarty:smarty:2.6.0
-
cpe:2.3:a:smarty:smarty:2.6.1
-
cpe:2.3:a:smarty:smarty:2.6.10
-
cpe:2.3:a:smarty:smarty:2.6.11
-
cpe:2.3:a:smarty:smarty:2.6.12
-
cpe:2.3:a:smarty:smarty:2.6.13
-
cpe:2.3:a:smarty:smarty:2.6.14
-
cpe:2.3:a:smarty:smarty:2.6.15
-
cpe:2.3:a:smarty:smarty:2.6.16
-
cpe:2.3:a:smarty:smarty:2.6.17
-
cpe:2.3:a:smarty:smarty:2.6.18
-
cpe:2.3:a:smarty:smarty:2.6.2
-
cpe:2.3:a:smarty:smarty:2.6.20
-
cpe:2.3:a:smarty:smarty:2.6.22
-
cpe:2.3:a:smarty:smarty:2.6.24
-
cpe:2.3:a:smarty:smarty:2.6.25
-
cpe:2.3:a:smarty:smarty:2.6.26
-
cpe:2.3:a:smarty:smarty:2.6.27
-
cpe:2.3:a:smarty:smarty:2.6.28
-
cpe:2.3:a:smarty:smarty:2.6.29
-
cpe:2.3:a:smarty:smarty:2.6.3
-
cpe:2.3:a:smarty:smarty:2.6.30
-
cpe:2.3:a:smarty:smarty:2.6.31
-
cpe:2.3:a:smarty:smarty:2.6.4
-
cpe:2.3:a:smarty:smarty:2.6.5
-
cpe:2.3:a:smarty:smarty:2.6.6
-
cpe:2.3:a:smarty:smarty:2.6.7
-
cpe:2.3:a:smarty:smarty:2.6.9
-
cpe:2.3:a:smarty:smarty:3.0.0
-
cpe:2.3:a:smarty:smarty:3.0.1
-
cpe:2.3:a:smarty:smarty:3.0.2
-
cpe:2.3:a:smarty:smarty:3.0.3
-
cpe:2.3:a:smarty:smarty:3.0.4
-
cpe:2.3:a:smarty:smarty:3.0.5
-
cpe:2.3:a:smarty:smarty:3.0.6
-
cpe:2.3:a:smarty:smarty:3.0.7
-
cpe:2.3:a:smarty:smarty:3.1
-
cpe:2.3:a:smarty:smarty:3.1.0
-
cpe:2.3:a:smarty:smarty:3.1.1
-
cpe:2.3:a:smarty:smarty:3.1.10
-
cpe:2.3:a:smarty:smarty:3.1.11
-
cpe:2.3:a:smarty:smarty:3.1.12
-
cpe:2.3:a:smarty:smarty:3.1.13
-
cpe:2.3:a:smarty:smarty:3.1.14
-
cpe:2.3:a:smarty:smarty:3.1.15
-
cpe:2.3:a:smarty:smarty:3.1.16
-
cpe:2.3:a:smarty:smarty:3.1.17
-
cpe:2.3:a:smarty:smarty:3.1.18
-
cpe:2.3:a:smarty:smarty:3.1.19
-
cpe:2.3:a:smarty:smarty:3.1.2
-
cpe:2.3:a:smarty:smarty:3.1.20
-
cpe:2.3:a:smarty:smarty:3.1.21
-
cpe:2.3:a:smarty:smarty:3.1.23
-
cpe:2.3:a:smarty:smarty:3.1.24
-
cpe:2.3:a:smarty:smarty:3.1.25
-
cpe:2.3:a:smarty:smarty:3.1.26
-
cpe:2.3:a:smarty:smarty:3.1.27
-
cpe:2.3:a:smarty:smarty:3.1.28
-
cpe:2.3:a:smarty:smarty:3.1.29
-
cpe:2.3:a:smarty:smarty:3.1.3
-
cpe:2.3:a:smarty:smarty:3.1.30
-
cpe:2.3:a:smarty:smarty:3.1.31
-
cpe:2.3:a:smarty:smarty:3.1.32
-
cpe:2.3:a:smarty:smarty:3.1.4
-
cpe:2.3:a:smarty:smarty:3.1.5
-
cpe:2.3:a:smarty:smarty:3.1.6
-
cpe:2.3:a:smarty:smarty:3.1.7
-
cpe:2.3:a:smarty:smarty:3.1.8
-
cpe:2.3:a:smarty:smarty:3.1.9
-
cpe:2.3:o:debian:debian_linux:9.0