Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a file:./../ substring in an include statement.
References
Link | Resource |
---|---|
https://github.com/smarty-php/smarty/issues/486 | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-09-11 06:29
Updated : 2018-11-16 06:38
NVD link : CVE-2018-16831
Mitre link : CVE-2018-16831
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
smarty
- smarty