CVE-2008-1066

The modifier.regex_replace.php plugin in Smarty before 2.6.19, as used by Serendipity (S9Y) and other products, allows attackers to call arbitrary PHP functions via templates, related to a '\0' character in a search string.
References
Link Resource
http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
http://secunia.com/advisories/29241 Vendor Advisory
http://secunia.com/advisories/29392 Vendor Advisory
http://secunia.com/advisories/29398 Vendor Advisory
http://secunia.com/advisories/29405 Vendor Advisory
http://secunia.com/advisories/29562 Vendor Advisory
http://secunia.com/advisories/29839 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201111-04.xml
http://www.debian.org/security/2008/dsa-1520
http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652
http://www.securityfocus.com/bid/28105
http://www.smarty.net/misc/NEWS
https://exchange.xforce.ibmcloud.com/vulnerabilities/41002
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html
http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html
http://secunia.com/advisories/29241 Vendor Advisory
http://secunia.com/advisories/29392 Vendor Advisory
http://secunia.com/advisories/29398 Vendor Advisory
http://secunia.com/advisories/29405 Vendor Advisory
http://secunia.com/advisories/29562 Vendor Advisory
http://secunia.com/advisories/29839 Vendor Advisory
http://security.gentoo.org/glsa/glsa-201111-04.xml
http://www.debian.org/security/2008/dsa-1520
http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652
http://www.securityfocus.com/bid/28105
http://www.smarty.net/misc/NEWS
https://exchange.xforce.ibmcloud.com/vulnerabilities/41002
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html
Configurations

Configuration 1 (hide)

cpe:2.3:a:smarty:smarty:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:43

Type Values Removed Values Added
References () http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html - () http://blog.s9y.org/archives/191-Serendipity-1.3-beta1-released.html -
References () http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html - () http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00008.html -
References () http://secunia.com/advisories/29241 - Vendor Advisory () http://secunia.com/advisories/29241 - Vendor Advisory
References () http://secunia.com/advisories/29392 - Vendor Advisory () http://secunia.com/advisories/29392 - Vendor Advisory
References () http://secunia.com/advisories/29398 - Vendor Advisory () http://secunia.com/advisories/29398 - Vendor Advisory
References () http://secunia.com/advisories/29405 - Vendor Advisory () http://secunia.com/advisories/29405 - Vendor Advisory
References () http://secunia.com/advisories/29562 - Vendor Advisory () http://secunia.com/advisories/29562 - Vendor Advisory
References () http://secunia.com/advisories/29839 - Vendor Advisory () http://secunia.com/advisories/29839 - Vendor Advisory
References () http://security.gentoo.org/glsa/glsa-201111-04.xml - () http://security.gentoo.org/glsa/glsa-201111-04.xml -
References () http://www.debian.org/security/2008/dsa-1520 - () http://www.debian.org/security/2008/dsa-1520 -
References () http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652 - () http://www.phpinsider.com/smarty-forum/viewtopic.php?p=47652 -
References () http://www.securityfocus.com/bid/28105 - () http://www.securityfocus.com/bid/28105 -
References () http://www.smarty.net/misc/NEWS - () http://www.smarty.net/misc/NEWS -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41002 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41002 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html - () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00298.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html - () https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00358.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html - () https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00551.html -

Information

Published : 2008-02-28 20:44

Updated : 2024-11-21 00:43


NVD link : CVE-2008-1066

Mitre link : CVE-2008-1066

CVE.ORG link : CVE-2008-1066


JSON object : View

Products Affected

smarty

  • smarty
CWE
CWE-20

Improper Input Validation