Smarty before 3.1.21 allows remote attackers to bypass the secure mode restrictions and execute arbitrary PHP code as demonstrated by "{literal}<{/literal}script language=php>" in a template.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-11-03 08:55
Updated : 2017-09-07 18:29
NVD link : CVE-2014-8350
Mitre link : CVE-2014-8350
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
smarty
- smarty