From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-200503-35.xml | 67 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 67 insertions(+) create mode 100644 metadata/glsa/glsa-200503-35.xml (limited to 'metadata/glsa/glsa-200503-35.xml') diff --git a/metadata/glsa/glsa-200503-35.xml b/metadata/glsa/glsa-200503-35.xml new file mode 100644 index 000000000000..fc25b3fb9049 --- /dev/null +++ b/metadata/glsa/glsa-200503-35.xml @@ -0,0 +1,67 @@ + + + + Smarty: Template vulnerability + + Smarty's "Template security" feature can be bypassed, potentially allowing + a remote attacker to execute arbitrary PHP code. + + smarty + 2005-03-30 + 2006-05-22: 03 + 86488 + remote + + + 2.6.9 + 2.6.9 + + + +

+ Smarty is a template engine for PHP. The "template security" feature of + Smarty is designed to help reduce the risk of a system compromise when + you have untrusted parties editing templates. +

+
+ +

+ A vulnerability has been discovered within the regex_replace modifier + of the Smarty templates when allowing access to untrusted users. + Furthermore, it was possible to call functions from {if} statements and + {math} functions. +

+
+ +

+ These issues may allow a remote attacker to bypass the "template + security" feature of Smarty, and execute arbitrary PHP code. +

+
+ +

+ Do not grant template access to untrusted users. +

+
+ +

+ All Smarty users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-php/smarty-2.6.9" +
+ + Smarty ChangeLog + CVE-2005-0913 + + + koon + + + koon + + + lewk + +
-- cgit v1.2.3