Vulnerabilities
Vulnerable Software
Smarty:  >> Smarty  >> 2.1.0  Security Vulnerabilities
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 before r2797 allows remote attackers to execute arbitrary PHP code via vectors related to templates and (1) a dollar-sign character, aka "php executed in templates;" and (2) a double quoted literal string, aka a "function injection security hole." NOTE: each vector affects slightly different SVN revisions.
CVSS Score
7.5
EPSS Score
0.014
Published
2008-10-31
The _expand_quoted_text function in libs/Smarty_Compiler.class.php in Smarty 2.6.20 r2797 and earlier allows remote attackers to execute arbitrary PHP code via vectors related to templates and a \ (backslash) before a dollar-sign character.
CVSS Score
7.5
EPSS Score
0.01
Published
2008-10-31
The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
CVSS Score
7.5
EPSS Score
0.012
Published
2008-02-28


Contact Us

Shodan ® - All rights reserved