The $smarty.template variable in Smarty3 allows attackers to possibly execute …
The $smarty.template variable in Smarty3 allows attackers to possibly execute arbitrary PHP code via the sysplugins/smarty_internal_compile_private_special_variable.php file.
References
- https://security-tracker.debian.org/tracker/CVE-2011-1028 x_refsource_MISC
- https://access.redhat.com/security/cve/cve-2011-1028 x_refsource_MISC
- https://seclists.org/oss-sec/2011/q1/313 x_refsource_MISC
- https://security-tracker.debian.org/tracker/CVE-2011-1028 x_transferred x_refsource_MISC
- https://access.redhat.com/security/cve/cve-2011-1028 x_transferred x_refsource_MISC
- https://seclists.org/oss-sec/2011/q1/313 x_transferred x_refsource_MISC
- https://security-tracker.debian.org/tracker/CVE-2011-1028 x_refsource_MISC
- https://access.redhat.com/security/cve/cve-2011-1028 x_refsource_MISC
- https://seclists.org/oss-sec/2011/q1/313 x_refsource_MISC
- https://security-tracker.debian.org/tracker/CVE-2011-1028 x_transferred x_refsource_MISC
- https://access.redhat.com/security/cve/cve-2011-1028 x_transferred x_refsource_MISC
- https://seclists.org/oss-sec/2011/q1/313 x_transferred x_refsource_MISC
Affected products
smarty3
- ==3
Package maintainers
-
@dasJ Janne Heß <janne@hess.ooo>