The smarty_function_math function in libs/plugins/function.math.php in Smarty 2.6.22 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the equation attribute of the math function. NOTE: some of these details are obtained from third party information.
References
Configurations
History
21 Nov 2024, 01:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/54380 - | |
References | () http://secunia.com/advisories/35072 - Vendor Advisory | |
References | () http://secunia.com/advisories/35219 - | |
References | () http://www.securityfocus.com/bid/34918 - Exploit | |
References | () http://www.ubuntu.com/usn/usn-791-3 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/50457 - | |
References | () https://www.exploit-db.com/exploits/8659 - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01274.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01283.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01287.html - |
Information
Published : 2009-05-18 18:30
Updated : 2024-11-21 01:03
NVD link : CVE-2009-1669
Mitre link : CVE-2009-1669
CVE.ORG link : CVE-2009-1669
JSON object : View
Products Affected
smarty
- smarty
CWE
CWE-20
Improper Input Validation