The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
References
Configurations
History
21 Nov 2024, 00:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html - | |
References | () http://secunia.com/advisories/29241 - Vendor Advisory | |
References | () http://secunia.com/advisories/29392 - Vendor Advisory | |
References | () http://secunia.com/advisories/29398 - Vendor Advisory | |
References | () http://secunia.com/advisories/29405 - Vendor Advisory | |
References | () http://secunia.com/advisories/29562 - Vendor Advisory | |
References | () http://secunia.com/advisories/29839 - Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-201111-04.xml - | |
References | () http://www.debian.org/security/2008/dsa-1520 - | |
References | () http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652 - | |
References | () http://www.securityfocus.com/bid/28105 - | |
References | () http://www.smarty.net/misc/NEWS - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41002 - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html - |
Information
Published : 2008-02-28 20:44
Updated : 2024-11-21 00:43
NVD link : CVE-2008-1066
Mitre link : CVE-2008-1066
CVE.ORG link : CVE-2008-1066
JSON object : View
Products Affected
smarty
- smarty
CWE
CWE-20
Improper Input Validation